WO2020253735A1 - 一种拥塞控制方法及装置 - Google Patents

一种拥塞控制方法及装置 Download PDF

Info

Publication number
WO2020253735A1
WO2020253735A1 PCT/CN2020/096617 CN2020096617W WO2020253735A1 WO 2020253735 A1 WO2020253735 A1 WO 2020253735A1 CN 2020096617 W CN2020096617 W CN 2020096617W WO 2020253735 A1 WO2020253735 A1 WO 2020253735A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
data processing
control node
node
processing node
Prior art date
Application number
PCT/CN2020/096617
Other languages
English (en)
French (fr)
Inventor
胡力
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP20826742.7A priority Critical patent/EP3972332A4/en
Priority to AU2020295588A priority patent/AU2020295588B2/en
Publication of WO2020253735A1 publication Critical patent/WO2020253735A1/zh
Priority to US17/554,242 priority patent/US20220256396A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • H04W76/32Release of transport tunnels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0284Traffic management, e.g. flow control or congestion control detecting congestion or overload during communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0289Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/32Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure

Definitions

  • This application relates to the field of mobile communication technology, and in particular to a congestion control method and device.
  • the 5th generation (5G) wireless communication technology has the characteristics of large capacity and high speed, which requires the 5G wireless communication system to have strong congestion control capabilities to deal with nodes that may appear in large capacity and high speed transmission congestion.
  • One of the reasons for node congestion is that the amount of data to be processed at the node is too large, causing the node to be overloaded.
  • a malicious terminal UE
  • DDoS distributed denial of service
  • a large number of connections are initiated and a large amount of attack traffic is transmitted, causing congestion in the nodes that process these traffic.
  • nodes reject service requests from UEs after congestion occurs. For example, service requests from all UEs that do not meet priority requirements will be rejected.
  • This congestion control method may affect the normal services of a large number of UEs and needs to be improved.
  • This application provides a congestion control method and device for optimizing the congestion control method of a wireless communication system.
  • this application provides a congestion control method, which can be implemented by a control node.
  • the control node can determine that the data processing node is in a congested state, and the data processing node is used to process the data sent by the terminal device; the control node can report the identification of the terminal device in the list stored by the control node
  • the corresponding first terminal device sends a first message, the identifier of the terminal device in the list is the identifier of the first terminal device in an abnormal state received by the control node, and the first message is used to indicate
  • the user plane connection is released, and the user plane connection is used to transmit data of the first terminal device.
  • the control node can perform congestion control on the terminal device to which the identifier in the list belongs according to the stored list. Since the list includes the identifier of the terminal device in an abnormal state, it is performing congestion control At this time, the control node can release the user plane connection of the terminal device in the abnormal state, thereby avoiding the influence of congestion control on the terminal device whose identity is not included in the list.
  • the introduction of independent control nodes can reduce the impact of the entire network.
  • the storage overhead of terminal equipment also facilitates centralized processing of abnormal terminal equipment.
  • the data processing node can notify the control node to handle a large number of abnormal state terminal devices by using a small signaling overhead by means of notification, which reduces the storage overhead and processing overhead of the data processing node.
  • the control node may receive the identifier of the second terminal device, which is a terminal device in an abnormal state. Wherein, the second terminal identifier is included in the list. If the data processing node is not in the congested state within the first time period, the control node may delete the identifier of the second terminal device from the list. Therefore, the control node can control the second terminal device within the first time period. When the first time period is exceeded, the second terminal device is less likely to cause congestion. Therefore, it no longer controls the terminal device to avoid interference. The normal business of the terminal device is affected.
  • Each of the above second terminal devices meets any one or more of the following conditions: there is a distributed denial of service DDoS attack during the transmission of the user plane data of the second terminal device; or, the target of the user plane data of the second terminal device The address is wrong; or, the user plane data whose transmission time length of the user plane data of the second terminal device reaches the threshold duration; or, the user plane data whose data length of the user plane data of the second terminal device reaches the threshold length; or, the second terminal The transmission rate of the user plane data of the device reaches the user plane data of the threshold rate.
  • the control node may delete the list, or delete all the identifiers in the list. Therefore, the control node can control the terminal devices in the list corresponding to the second time period within the second time period. After the second time period is exceeded, these terminal devices are less likely to cause congestion, and therefore no longer control these terminal devices. , To avoid affecting the normal business of the terminal device.
  • control node may determine that the data processing node is in a congested state according to the received first instruction.
  • the first indication may include the identification of the data processing node.
  • the first indication may be used to indicate that the data processing node is in the congested state.
  • control node Before receiving the first instruction, the control node may send a second instruction to the data processing node, where the second instruction is used to instruct the data processing node to send the first instruction when in the congested state.
  • the first indication may be used to indicate the operating status of the data control node, for example, CPU usage rate and/or data packet loss rate, etc.
  • the control node Before receiving the first instruction, the control node may send a second instruction to the data processing node, and the second instruction may be used to instruct the data processing node to send the first instruction when a specific condition for sending the first instruction is met.
  • the specific condition for sending the first indication may be that the sending cycle is satisfied or a specific event occurs.
  • the data processing node may according to the second indication, when the CPU usage rate reaches (or exceeds) the usage rate threshold contained in the second indication After that, the CPU usage rate is reported, and/or the data processing node can, according to the second instruction, after the data packet loss rate (or packet loss rate) reaches (or exceeds) the data packet loss rate threshold included in the second instruction , Report the data packet loss rate.
  • the above first message may include the identifier of the user plane connection. Therefore, the first message can be used to instruct the first terminal device to release the user plane connection indicated by the first message, so as to avoid congestion control to mailboxes connected to other user planes.
  • the control node may determine the identity of the data network according to the respective contexts of the multiple data processing nodes. At least two data processing nodes in the processing nodes support the data network, the respective contexts of the multiple data processing nodes are stored in the control node, and the context of each data processing node includes each of the data processing nodes.
  • the identification of the data network supported by the data processing node; and, the control node may determine the identification of the user plane connection according to the context of the first terminal device and the identification of the data network, the first terminal device
  • the context of is stored in the control node, and the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • the control node may receive the identification of the data network from the SMF, and at least two of the multiple data processing nodes support The data network; and, the control node may determine the identity of the user plane connection according to the context of the first terminal device and the identity of the data network, and the context of the first terminal device is stored in the For the control node, the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • control node when the control node includes SMF, if the control node determines that the data processing node is in the congested state, when receiving a first user plane connection establishment request from the first terminal device , The control node may send the rejection response to the first terminal device, where the rejection response corresponds to the first user plane connection establishment request, and the rejection response is used to indicate that the first terminal device is in the third period of time The user plane connection establishment request is not sent within.
  • control node determines that the data processing node is not in the congested state, if the control node also receives a second user plane connection establishment request from the first terminal device, the control node may send The first terminal device sends an acceptance response, and the acceptance response corresponds to the second user plane connection establishment request. Therefore, when the control node determines that the data processing node is no longer in a congested state, the control node no longer rejects the user plane connection establishment request of the first terminal device, so as to avoid affecting the normal service of the terminal device.
  • control node when the control node includes AMF, if the control node receives the first signaling connection establishment request from the first terminal device, the control node may send to the first terminal device A rejection response, where the rejection response corresponds to the first signaling connection establishment request, and the rejection response is used to indicate that the abnormal terminal device does not send a signaling connection establishment request within a fourth time period.
  • control node determines that the data processing node is not in the congested state
  • the control node may send the The first terminal device sends an acceptance response, and the acceptance response corresponds to the second signaling connection establishment request. Therefore, when the control node determines that the data processing node is no longer in a congested state, the control node no longer rejects the signaling connection establishment request of the first terminal device to avoid affecting the normal service of the terminal device.
  • control node may receive the third instruction, and according to the third instruction, determine that the data processing node is not in the congested state.
  • the third indication may include the identification of the data processing node. Therefore, the control node can learn in time that the data node is no longer in a congested state, and avoid the impact on the service of the first terminal device.
  • the third indication may be used to indicate that the data processing node is not in the congested state. At this time, the third indication may be sent by the data processing node after determining that it is not in the congested state.
  • control node Before receiving the third instruction, the control node may further send a fourth instruction to the data processing node, and the fourth instruction may be used to instruct the data processing node to send the third instruction after determining that it is not in a congested state.
  • the third indication can be used to indicate the operating status of the data processing node, such as the CPU usage rate and/or the data packet loss rate. According to the third indication combined with its own pre-configured strategy to determine whether the data processing node is not In a congested state.
  • the control node Before receiving the third instruction, the control node may further send a fourth instruction to the data processing node, and the fourth instruction may be used to instruct the data processing node to send the third instruction after satisfying a specific condition for sending the third instruction.
  • the specific condition may be that the sending period is satisfied, such as the period included in the fourth instruction.
  • the specific condition may be the occurrence of a specific event.
  • the data processing node may report the CPU usage rate after the CPU usage rate has not reached (or less than) the usage rate threshold contained in the fourth instruction according to the fourth instruction, and /Or, according to the fourth instruction, the data processing node may report the data packet loss rate after the data packet loss rate has not reached (or is less than) the data packet loss rate threshold included in the fourth instruction.
  • the usage rate threshold contained in the fourth indication may be the same as or different from the usage threshold contained in the second indication.
  • the data packet loss rate threshold included in the fourth indication may be the same as or different from the data packet loss rate threshold included in the second indication.
  • control node Before receiving the third instruction, the control node may further send a fourth instruction to the data processing node, where the fourth instruction is used to instruct the data processing node to send the third instruction when it is not in the congested state.
  • control node when the control node includes AMF, the control node may further send a second message to the first terminal device, where the second message is used to indicate the location of the first terminal device It is set as an unsupported area, and the unsupported area does not support the first terminal device's request to establish a signaling connection. Therefore, the AMF can modify the location of the first terminal device to an unsupported area, so that the first terminal device no longer sends a signaling connection establishment request, so as to reduce the occupation of the data processing node.
  • the above first message may include a fifth indication, and the fifth indication is used to instruct the first terminal device not to reply to the first message. Therefore, the control node can make the first terminal device not send the response message of the first message, so as to reduce the occupation of the data processing node by the response message.
  • the above control nodes may include SMF or AMF.
  • control node is SMF
  • the above first message can be carried in NAS SM signaling. If the control node is AMF, the above first message can be carried in NAS signaling.
  • this application provides a congestion control method, which can be implemented by a first terminal device.
  • the first terminal device can receive a first message from the control node, the first message is used to instruct the release of a user plane connection, the user plane connection is used to transmit data of the first terminal device, and the first message
  • a control message includes a fifth instruction; the fifth instruction is used to instruct the first terminal device not to reply to the first message; the first terminal device may release the user plane connection according to the first message.
  • this application provides a congestion control method, which can be implemented by a data processing node.
  • the data processing node can determine that it is no longer in the congested state, and send a third indication to the control node, where the third indication is used to indicate that the data processing node is not in the congested state.
  • the above third indication may include the identification of the data processing node.
  • the data processing node Before sending the above third instruction, the data processing node may receive a fourth instruction from the control node, where the fourth instruction is used to indicate that the data processing node that is not in the congested state sends the The third instruction.
  • the present application provides a communication device that can be used to perform the steps performed by the control node in the first aspect or any possible design of the first aspect.
  • the communication device can implement each function in the above-mentioned methods through a hardware structure, a software module, or a hardware structure plus a software module.
  • the communication device may include a processor.
  • the steps performed by the control node in the above first aspect or any possible design of the first aspect may be executed by the processor.
  • the communication device may include a transceiver, and the transceiver may be used to support the above device to communicate with other devices or devices. Specifically, the transceiver can be used to support communication by a communication device.
  • the device may further include a memory, the memory may be used to store a program, and the program may be executed by the processor to perform the steps performed by the above communication device.
  • the above processor can be used to determine that the data processing node is in a congested state, and the data processing node is used to process data sent by the terminal device; the above transceiver can be used to store data to the control node.
  • the first terminal device corresponding to the identifier of the terminal device in the list sends a first message, and the identifier of the terminal device in the list is the identifier of the first terminal device in an abnormal state received by the control node
  • the first message is used to instruct to release a user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the transceiver may also be used to receive an identifier of a second terminal device, the second terminal device being a terminal device in an abnormal state; the second terminal identifier is included in the list; if the data is within the first time period If the processing node is not in the congested state, the processor is further configured to delete the identifier of the second terminal device from the list.
  • the processor may also be used to delete the list; or, delete all the identifiers in the list.
  • the above transceiver may also be used to receive a first indication, the first indication being used to indicate that the data processing node is in the congested state; the above processor may determine that the data processing node is in the congested state according to the first indication .
  • the above transceiver may also send a second instruction to the data processing node, where the second instruction is used to instruct the data processing node to send the first instruction when in the congested state.
  • the above first message may include the identifier of the user plane connection.
  • the above processor may also determine the identity of the data network according to the respective contexts of the multiple data processing nodes, and the multiple data processing nodes At least two data processing nodes in the processing nodes support the data network, the respective contexts of the multiple data processing nodes are stored in the control node, and the context of each data processing node includes each of the data processing nodes.
  • the identifier of the data network supported by the data processing node; and the processor may determine the identifier of the user plane connection according to the context of the first terminal device and the identifier of the data network, and the context of the first terminal device Stored in the control node, the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • the above transceiver may also be used to receive the identification of the data network from the SMF, and at least two data of the multiple data processing nodes
  • the processing node supports the data network; the above processor may also be used to determine the identity of the user plane connection according to the context of the first terminal device and the identity of the data network, and the context of the first terminal device is stored in
  • the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • the above transceiver may also send a request to the first terminal device after receiving the first user plane connection establishment request from the first terminal device.
  • the rejection response is sent, the rejection response corresponds to the first user plane connection establishment request, and the rejection response is used to instruct the first terminal device not to send the user plane connection establishment request within a third period of time.
  • the above processor may also be used to determine that the data processing node is not in the congested state; then the above transceiver may also send a request to the first terminal after receiving a second user plane connection establishment request from the first terminal device The device sends an acceptance response, and the acceptance response corresponds to the second user plane connection establishment request.
  • the above transceiver may also send the first signaling connection establishment request from the first terminal device to the first terminal device.
  • a rejection response is sent, the rejection response corresponds to the first signaling connection establishment request, and the rejection response is used to instruct the abnormal terminal device not to send the signaling connection establishment request within the fourth time period.
  • the above processor may also be used to determine that the data processing node is not in the congested state; the transceiver may also notify the first terminal device after receiving the second signaling connection establishment request from the first terminal device The device sends an acceptance response, and the acceptance response corresponds to the second signaling connection establishment request.
  • the above transceiver may also be used to receive a third indication, the third indication being used to indicate that the data processing node is not in the congested state; the above processor may determine that the data processing node is not in the congested state according to the third indication The congestion state.
  • the transceiver Before receiving the third instruction, the transceiver may further send a fourth instruction to the data processing node, where the fourth instruction is used to instruct the data processing node to send the third instruction when it is not in the congested state.
  • the transceiver may also be used to send a second message to the first terminal device, and the second message may be used to instruct to set the location of the first terminal device as an unsupported area, so The unsupported area does not support the first terminal device's request to establish a signaling connection.
  • the above first message may include a fifth indication, and the fifth indication is used to instruct the first terminal device not to reply to the first message.
  • the communication device may include a communication module and a processing module coupled with each other.
  • the communication module may be used to support the communication device to communicate, and the processing module may be used for the communication device to perform processing operations, such as generating information/messages that need to be sent. , Or process the received signal to get information/message.
  • the communication module may be used to perform the steps performed by the above transceiver, and/or the processing module may be used to perform the steps performed by the above processor.
  • the present application provides a communication device that can be used to perform the steps performed by the first terminal device in the second aspect or any possible design of the second aspect.
  • the communication device can implement each function in the above-mentioned methods through a hardware structure, a software module, or a hardware structure plus a software module.
  • the communication device shown in the fifth aspect is implemented by hardware components, the communication device may include a processor.
  • the processing steps executed by the first terminal device in the above second aspect or any possible design of the second aspect may be executed by the processor.
  • the communication device may include a transceiver, and the transceiver may be used to support the above device to communicate with other devices or devices.
  • the device may further include a memory, the memory may be used to store a program, and the program may be executed by the processor to execute the processing steps performed by the above first terminal device.
  • the transceiver may be used to receive a first message from the control node, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit data of the terminal device
  • the first control message includes a fifth instruction, and the fifth instruction is used to instruct the first terminal device not to reply to the first message; the processing module may be used to release the user plane connection according to the first message.
  • the communication device may include a communication module and a processing module coupled with each other.
  • the communication module may be used to support the communication device to communicate, and the processing module may be used for the communication device to perform processing operations, such as generating information/messages that need to be sent. , Or process the received signal to get information/message.
  • the communication module may be used to perform the steps performed by the above transceiver, and/or the processing module may be used to perform the steps performed by the above processor.
  • the present application provides a communication device that can be used to execute the steps performed by the data processing node in the third aspect or any possible design of the third aspect.
  • the communication device can implement each function in the above-mentioned methods through a hardware structure, a software module, or a hardware structure plus a software module.
  • the communication device shown in the first aspect is implemented by hardware components, the communication device may include a processor.
  • the processing steps executed by the data processing node in the above third aspect or any possible design of the third aspect may be executed by the processor.
  • the communication device may include a transceiver, and the transceiver may be used to support the above device to communicate with other devices or devices.
  • the device may further include a memory, the memory may be used to store a program, and the program may be executed by the processor to execute the processing steps performed by the above data processing node.
  • the processing module may be used to determine that the data processing node is no longer in a congested state; the communication module may be used to send a third instruction to the control node, and the third instruction is used to instruct the data processing node In the congested state.
  • no longer in a congested state means that the data processing node was previously in but is no longer in a congested state.
  • the above third indication may include the identification of the data processing node.
  • the above communication module may also be used to receive a fourth indication from the control node, where the fourth indication is used by the data processing node to indicate to the data processing node that is not in the congested state to send the The third instruction.
  • the communication device may include a communication module and a processing module coupled with each other.
  • the communication module may be used to support the communication device to communicate, and the processing module may be used for the communication device to perform processing operations, such as generating information/messages that need to be sent. , Or process the received signal to get information/message.
  • the communication module may be used to perform the steps performed by the above transceiver, and/or the processing module may be used to perform the steps performed by the above processor.
  • the present application provides a communication system, which may include the communication device and data processing node shown in the fourth aspect.
  • the control node when implementing the congestion control method provided in the embodiment of the present application, can be used to determine that the data processing node is in a congested state, and the data processing node is used to process terminal devices The data sent.
  • the control node may also send a first message to the first terminal device corresponding to the identification of the terminal device in the list stored by the control node, where the identification of the terminal device in the list is in an abnormal state received by the control node
  • the identifier of the first terminal device, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the data control node can be used to send a first instruction to the control node.
  • the control node may receive the first instruction from the data processing node.
  • the first indication may be used to indicate that the data control node is in a congested state.
  • the communication system may further include the communication device shown in the fifth aspect.
  • the first terminal device may be used to receive the first message from the control node and release the user plane connection according to the first message.
  • the communication system may further include the communication device shown in the sixth aspect.
  • the data processing node may also send a third instruction to the control node.
  • the control node may receive the third instruction from the data processing node.
  • the third indication can be used to indicate that the data processing node is not in a congested state.
  • the third indication may be sent after the data processing node is no longer in a congested state.
  • this application provides a computer storage medium in which instructions (or programs) are stored, which when invoked and executed on a computer, cause the computer to execute the first aspect or the first aspect.
  • instructions or programs
  • the present application provides a computer program product.
  • the basic computing product may contain instructions that, when the computer program product runs on a computer, cause the computer to execute the first aspect or any one of the first aspects described above. Design, any possible design of the second aspect or the second aspect, or the method described in the third aspect or any possible design of the third aspect.
  • the present application provides a chip or a chip system including the chip, and the chip may include a processor.
  • the chip may also include a memory (or storage module) and/or a transceiver (or communication module).
  • the chip can be used to implement any possible design of the first aspect or the first aspect, any possible design of the second or second aspect, or any possible design of the third aspect or the third aspect.
  • the chip system may be composed of the above-mentioned chips, or may include the above-mentioned chips and other discrete devices, such as a memory (or storage module) and/or a transceiver (or communication module).
  • FIG. 1 is a schematic structural diagram of a wireless communication system provided by an embodiment of this application.
  • FIG. 2 is a schematic flowchart of a congestion control method provided by an embodiment of this application.
  • FIG. 3 is a schematic flowchart of another congestion control method provided by an embodiment of the application.
  • FIG. 5 is a schematic flowchart of another congestion control method provided by an embodiment of this application.
  • FIG. 6 is a schematic flowchart of another congestion control method provided by an embodiment of this application.
  • FIG. 7 is a schematic structural diagram of a communication device provided by an embodiment of this application.
  • FIG. 8 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of another communication device provided by an embodiment of this application.
  • FIG. 12 is a schematic structural diagram of another communication device provided by an embodiment of the application.
  • the congestion control method provided by the embodiment of the present application can be used in a 5G communication system.
  • the 5G network architecture may include three parts, namely a terminal device part, a data network (DN) and an operator network part.
  • the sites in the operator network may include but are not limited to: network slice selection function (NSSF), network exposure function (NEF) network elements, network storage function (network function repository function, NRF) Network element, policy control function (PCF) network element, unified data management (UDM) network element, application function (AF) network element, network data analysis function (network data analysis function, NWDAF) network element, authentication server function (authentication server function, AUSF) network element, access and mobility management function (AMF) network element, session management function (session management function, SMF) network element , (Radio) access network ((radio) access network, (R) AN) and user plane function (user plane function, UPF) network elements, etc.
  • the part other than the (wireless) access network part may be referred to as the core network (CN) part.
  • CN core network
  • the UE as shown in Figure 1 can be a device or device with wireless transceiver function, which can be deployed on land, including indoor or outdoor, handheld or vehicle-mounted; or on the water (such as ships, etc.); Deploy in the air (for example, on airplanes, balloons, satellites, etc.).
  • the UE may be a mobile phone (mobile phone), a tablet computer (pad), a computer with wireless transceiving function, a virtual reality (VR) terminal, an augmented reality (AR) terminal, an industrial control (industrial control) Wireless terminals in the 5G vertical industry, mobile robots in the 5G vertical industry, automated guided vehicles (AGV), sensors, control equipment, or wireless terminals such as vehicles and train equipment, and unmanned Wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety, and smart city Wireless terminals, wireless terminals in smart homes, etc.
  • the UE may be implemented by a chip or a chip system.
  • the UE may also be a terminal device.
  • the terminal device in this application may also be a chip or a chip system.
  • the aforementioned UE may establish a connection with the operator's network through an interface (such as N1, etc.) provided by the operator's network, and use services such as data and/or voice provided by the operator's network.
  • the UE may also access the DN through the operator's network, and use the operator services deployed on the DN, and/or services provided by a third party.
  • the aforementioned third party may be a service party other than the operator's network and the UE, and may provide other services such as data and/or voice for the UE.
  • the specific form of expression of the aforementioned third party can be determined according to actual application scenarios, and is not limited here.
  • Access network equipment refers to equipment that provides wireless communication functions for terminals.
  • the access network equipment mentioned in this application includes, but is not limited to: next-generation base stations (gnodeB, gNB), evolved node B (evolved node B, eNB), radio network controller (RNC) in 5G, Node B (node B, NB), base station controller (BSC), base transceiver station (base transceiver station, BTS), home base station (for example, home evolved nodeB, or home node B, HNB), baseband unit (baseBand unit, BBU), transmission point (transmitting and receiving point, TRP), transmission point (transmitting point, TP), or mobile switching center, etc.
  • next-generation base stations gnodeB, gNB
  • evolved node B evolved node B
  • eNB evolved node B
  • RNC radio network controller
  • Node B node B
  • BSC base station controller
  • BTS base transceiver station
  • BTS home base station
  • base station
  • the above network slicing selection NSSF network element can be used to realize flexible selection of network slicing.
  • the network slice selection network element can support a slice selection strategy based on various information such as network slice selection assistance information (network slice selection assistance information, NSSAI), location information, or slice load information, and intelligentization can be realized based on the slice selection strategy The slice selection scheme.
  • the network slice selection network element may store information such as slice selection strategy configured by the operator.
  • the network slice selection network element can be an NSSF network element.
  • future communications such as 6G (the 6th generation, 6G)
  • the network slice selection network element can still be an NSSF network element or has other names. This application does not Make a limit.
  • the access and mobility management function AMF network element (or AMF entity) shown above is the control plane network element provided by the operator's network, and the AMF network element is used as non-access stratum (NAS) signaling
  • the termination point is responsible for functions such as access authentication and mobility management of the terminal device.
  • the access and mobility management function network element can be an AMF network element.
  • future communications such as the sixth generation, the access and mobility management function network element can still be an AMF network element, or have other names, This application is not limited.
  • the AMF network element may be realized by a chip or a chip system.
  • the above-mentioned session management SMF network element is a control plane network element provided by an operator network, and is responsible for managing a protocol data unit (PDU) session of a terminal device.
  • the PDU session is a channel used to transmit PDUs.
  • the terminal device needs to transmit PDUs to each other through the PDU session and the DN.
  • the PDU session is established, maintained, and deleted by the SMF network element.
  • the SMF network element may include functions such as session management (such as session establishment, modification, and release, including tunnel maintenance between UPF and RAN), Internet protocol (IP) address allocation of the UE, and UPF network element selection.
  • the session management network element may be an SMF network element.
  • future communications such as 6G, the session management network element may still be an SMF network element or have other names, which is not limited in this application.
  • the SMF network element may be implemented by a chip or a chip system.
  • the above-mentioned user plane function UPF network element is a gateway provided by an operator, and a gateway for communication between the operator's network and the DN.
  • UPF network elements may include functions such as user plane mobility anchors, user data forwarding and routing, packet inspection, user plane policy implementation, and quality of service (QoS) processing.
  • the user plane function network element may be a UPF network element.
  • future communications such as 6G, the user plane function network element may still be a UPF network element or have other names, which is not limited by this application.
  • the UPF network element may be implemented by a chip or a chip system.
  • DN which can also be called packet data network (PDN)
  • PDN packet data network
  • the operator’s network can access multiple DNs, and multiple services can be deployed on the DN to provide terminal devices with Services such as data and/or voice.
  • DN is a private network of a smart factory.
  • the sensors installed in the workshop of the smart factory can be terminal devices.
  • the control server of the sensor is deployed in the DN, and the control server can provide services for the sensors.
  • the sensor can communicate with the control server, obtain instructions from the control server, and transmit the collected sensor data to the control server according to the instructions.
  • a DN is an internal office network of a company.
  • the mobile phones or computers of employees of the company can be terminal devices, and the mobile phones or computers of employees can access information and data resources on the company's internal office network.
  • the DN can be identified by the identification of the DN, such as a data network name (DNN).
  • the identifier of the DN may also include an access point name (access point name, APN).
  • the above unified data management UDM network element is a control plane network element provided by the operator, which is responsible for storing the subscriber permanent identifier (SUPI) and credential (credential) of the subscribers in the operator’s network. ), security context (security context), contract data and other information.
  • the information stored in the UDM network element can be used for authentication and authorization of the terminal device accessing the operator's network.
  • the contracted users of the above-mentioned operator's network may specifically be users who use the services provided by the operator's network, such as users who use China Telecom's mobile phone core card, or users who use China Mobile's mobile phone core card.
  • the SUPI of the aforementioned subscriber can be the number of the mobile phone core card, etc.
  • the credential and security context of the aforementioned subscriber may be a small file stored such as the encryption key of the mobile phone core card or information related to the encryption of the mobile phone core card for authentication and/or authorization.
  • the aforementioned security context may be data (cookie) or token (token) stored on the user's local terminal (for example, mobile phone).
  • the contract data of the aforementioned subscriber may be the supporting service of the mobile phone core card, such as the data package of the mobile phone core card or the use of the network. It should be noted that permanent identifiers, credentials, security contexts, authentication data (cookies), and tokens are equivalent to information related to authentication and authorization. In this application file, no distinction or restriction is made for the convenience of description.
  • the unified data management network element may be a UDM network element.
  • the unified data management element may still be a UDM network element or have other names, which is not limited in this application.
  • the above network opening function NEF network element (or NEF entity) is a control plane network element provided by the operator.
  • the network opening function network element opens the external interface of the operator's network to a third party in a safe manner.
  • the network opening function network element can be used as a relay for the communication between the SMF network element and the third-party network element.
  • the network open function network element can be used as the translation of the identification information of the subscriber and the translation of the identification information of the third-party network element. For example, when NEF sends the SUPI of the subscriber from the operator network to the third party, it can translate the SUPI into its corresponding external identity (identity, ID).
  • the network opening function network element when it sends the external ID (third-party network element ID) to the operator's network, it can be translated into SUPI.
  • the network opening function network element may be a NEF network element.
  • the network opening function network element may still be a NEF network element or have other names, which is not limited by this application.
  • the NEF network element may be implemented by a chip or a chip system.
  • the above policy control function PCF network element is a control plane function provided by the operator, which is used to provide a PDU session strategy to the SMF network element.
  • Policies can include charging-related policies, QoS-related policies, and authorization-related policies.
  • the policy control function network element may be a PCF network element.
  • future communications such as 6G, the policy control function network element may still be a PCF network element or have other names, which is not limited in this application.
  • the above network storage function NRF network element (or NRF entity) can be used to discover services provided by other network functions for each network function, and then provide the discovered network element information to the requesting network element.
  • the network storage function network element can also maintain (such as store, manage and update) the characteristics of the available network element instance and the related parameters of the business capabilities it supports, such as the network element instance identifier, network element type, PLMN, network segmentation related identifiers, For example, network slice selection assistance information (single network slice selection assistance information, S-NSSAI) or network slice instance identifier, IP address or domain name of the network element, capability information of the network element, supported service capability names, etc.
  • the network storage function network element may be NRF.
  • future communications such as 6G, the network open network element may still be NRF or have other names, which is not limited by this application.
  • NWDAF network element can be used to provide big data analysis services. This entity can collect data from the 3GPP network and perform big data analysis to provide better strategies.
  • NWDAF network elements can be used to detect UEs in abnormal states (or abnormal behaviors), such as DDoS attacks on the UE, the UE in an unexpected location, the UE generating unexpected high-rate or large-flow data, and the UE Wake up in an unexpected period or the UE accesses the wrong target address, etc.
  • the NWDAF network element can collect the identities of these UEs in abnormal states.
  • the NWDAF network element may also collect the identifier of the abnormal state that the UE is in, where the identifier of the abnormal state is used, for example, to indicate that the UE has a distributed denial of service (DDoS) attack behavior.
  • the NWDAF network element may also collect the corresponding relationship between the UE in the abnormal state and the identifier of the abnormal state.
  • the above application function AF network element can be used to provide application services.
  • Such application services may be provided by a third party or an operator.
  • the AF network element may include a firewall or an intrusion detection system.
  • the AF network element may be used to detect UEs in an abnormal state and collect the identities of these UEs in an abnormal state.
  • the AF network element may also collect the identifier of the abnormal state in which the UE is located.
  • the 5G communication system described in this application may include a security detection function (SEDF).
  • SEDF security detection function
  • the security detection function can analyze UE traffic and find malicious traffic. Based on the security detection function, the identification of the UE in an abnormal state and/or the identification of the abnormal state can be collected.
  • the above AF network element or NWDAF network element can be used to implement this function.
  • the UE may be replaced with a terminal device in this application.
  • the UE in an abnormal state collected by the AF network element and/or the NWDAF network element may be referred to as the first terminal device.
  • Nnssf, Nnef, Nausf, Nnrf, Npcf, Mnwdaf, Nudm, Naf, Namf, Nsmf, N1, N2, N3, N4, and N6 are interface serial numbers.
  • the meaning of these interface serial numbers can refer to the meaning defined in the 3GPP standard protocol, which is not limited here.
  • the AMF network element can be described as AMF
  • the SMF network element can be described as SMF
  • the UPF network element can be described as UPF
  • the NEF network element can be described as NEF
  • the AF network element can be described as Described as AF
  • NWDAF network element can be described as NWDAF.
  • the user plane data transmission path of the UE may include path one: UE-RAN-UPF-DN.
  • the user plane data transmission path of the UE may also include path two: UE-RAN-NEF-AF.
  • UPF and/or NEF may be referred to as data processing nodes in this application, and may be used to process data sent by the UE.
  • DDoS attack Take a DDoS attack as an example to illustrate the cause of congestion: When a large number of UEs are controlled by an attacker to initiate a large number of DDoS attacks that access DN/AF, a large number of UE user plane data will be aggregated to UPF and/or NEF, so in UPF and /Or NEF may cause congestion.
  • the control method can be executed by the control node, and the method can be used to reduce data occupation of the data processing node when the data processing node is in a congested state.
  • the control node described in this application may include SMF or AMF as shown in FIG. 1.
  • the data processing node described in this application may include UPF, NEF, AMF, and/or SMF.
  • the present application provides a congestion control method, which may include the following steps:
  • the control node determines that the data processing node is in a congested state. Among them, the data processing node is used to process data sent by the terminal device.
  • control node may receive the identification of the first terminal device from the AF and/or NWDAF.
  • the data processing node may include at least one of AMF, SMF, UPF, or NEF.
  • the control node sends a first message to the first terminal device corresponding to the terminal device identifier in the list (or blacklist) stored by the control node, and the terminal device identifier in the list is received by the control node
  • the identifier of the first terminal device in an abnormal state, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the first terminal device mentioned in this application refers to the terminal device corresponding to the identification of the terminal device in the list stored by the control node.
  • the first terminal device receives the first message.
  • S103 The first terminal device releases the user plane connection according to the first message.
  • the control node can release the user plane connection of the first terminal device after the data processing node is in a congested state, thereby reducing the occupation of the data processing node by the data sent by the first terminal device and reducing the congestion of the data processing node , While avoiding the influence of congestion control on terminal devices whose identification is not included in the list.
  • control node may receive the identifier of the second terminal device from the AF network element and/or the NWDAF network element, where the second terminal device described in this application is a terminal device in an abnormal state.
  • the number of the identifiers of the second terminal device may be one or more.
  • each second terminal device satisfies any one or more of the following conditions: the transmission process of the user plane data of the second terminal device has a distributed denial of service DDoS attack; or, the user plane data of the second terminal device has The target address is wrong; or, the user plane data whose transmission time of the user plane data of the second terminal device reaches the threshold duration; or, the user plane data whose data length of the user plane data of the second terminal device reaches the threshold length; or, the second The user plane data whose transmission rate of the user plane data of the terminal device reaches the threshold rate.
  • the control node may subscribe to the AF network element and/or the NWDAF network element the identification of the terminal device in the abnormal state, for example, the control node may send a subscription request to the AF network element and/or the NWDAF network element to request the AF After the network element and/or the NWDAF network element detects the terminal device in the abnormal state, it sends the identification of the terminal device in the abnormal state (ie, the second terminal device) to the control node. It should be understood that this application does not limit the manner in which the AF network element and/or the NWDAF network element detects the terminal device in an abnormal state.
  • control node may execute the step of S102 each time after receiving the identifier of the second terminal device, or the control node may have the number of identifiers of the first terminal device in the list reach ( Or after a certain threshold is exceeded, the step S102 is executed, which is not limited by this application.
  • the control node may store the list according to the received identifier of the second terminal device.
  • the control node may receive the identifier of the second terminal device and the identifier of the abnormal state in which the second terminal device is located.
  • the control node may store the identification of the second terminal device in the list. Otherwise, when the second terminal device is in an abnormal state other than the DDoS attack, the control node does not store the identification of the second terminal device in the list.
  • control node when the control node performs control congestion control for the terminal devices in the list, it preferentially releases the user plane connections of the terminal devices with DDoS attacks, further improving the accuracy of congestion control, and avoiding the impact of congestion control on terminal devices that do not have DDoS estimation. .
  • the identity of the second terminal device may be the identity of one terminal device or the identity of a group of terminal devices.
  • the identifier of the second terminal device may be one or a group of user permanent identity (subscription permanent identifier, SUPI), general public subscription identifier (generic public subscription identifier, GPSI), internal group identifier, tracking area code (tracking area code) , TAC) etc.
  • the identifier of the abnormal state is used to indicate the abnormality of the terminal, and can be used to indicate the existence of distributed denial of service (DDoS) attack behavior of the UE, the UE is in an unexpected position, the UE generates an unexpected high rate or One or more abnormal states in heavy traffic data, UE waking up in an unexpected period, or UE accessing the wrong target address.
  • DDoS distributed denial of service
  • the control node may generate a list according to the identification of the second terminal device. Therefore, the identifier in the list can be used to identify the terminal device in an abnormal state.
  • the control node may store one or more lists, and each list may include at least one identifier.
  • the terminal device described by the identifier contained in the list can be called the first terminal device, that is, when the control node stores a list, the terminal device to which the identifier in the list belongs can be called the first terminal device. It is the first terminal device.
  • the control node stores multiple lists, the terminal devices to which the identities included in the multiple lists belong can be referred to as the first terminal device.
  • the control node may record the abnormal indication corresponding to the second terminal device in the context of the second terminal device.
  • the abnormal indication may be the abnormal state of the second terminal device or the identifier of the abnormal state. Or an indication message corresponding to the identifier of the abnormal state, etc., so that the second terminal device can be associated with the abnormal state.
  • the control node can find the context of the identified second terminal device according to the identifier of the second terminal device, and record the abnormal indication in the context.
  • the abnormality indication is obtained according to the identifier of the abnormal state, which can be a binary bit, where 1 represents abnormality, and 0 represents normal.
  • the abnormal indication is recorded as 1.
  • the control node directly records the abnormal state in the context, such as storing the identifier of the abnormal state.
  • the control node may logically obtain the contexts storing the corresponding abnormal state from the contexts of all second terminal devices to obtain a list, and the terminal device to which the identifier in the list belongs may be called the first terminal device.
  • the control node may delete the identifier of the second terminal device from the list.
  • the identities of different terminal devices may respectively correspond to the same or different first durations.
  • the correspondence between the identifiers of the terminal devices in the list and the first duration may be as shown in Table 1.
  • the control node may perform the timing of the first duration according to Table 1, and after the timing of the first duration expires, delete the identifier corresponding to the first duration of the timing expired from the list. It should be understood that the correspondences shown in Table 1 are merely examples.
  • the control node may determine the first duration corresponding to the identifier of each terminal device in a random manner, or may determine the first duration corresponding to the identifier of each terminal device through a protocol or a pre-configured manner. Exemplarily, for the identifier of the second terminal device received more than once, the control node may set a longer first duration.
  • the control node can set a shorter first duration corresponding to the identifier "ID_UE 1"; for another example, if the control node has more times (For example, reaching or exceeding the threshold of the number of times)
  • the identification "ID_UE 2" of the terminal device UE 2 is received from the NWDAF, that is, the terminal device is more likely to cause congestion of the data processing node, and the control node can set a longer first duration and The identification of the terminal device "ID_UE 2" corresponds.
  • the control node may execute the timing of the first duration corresponding to the identifier of the terminal device after storing the identifier in the list. For example, when the control node receives the identifier "ID_UE 3" of the UE 3 from the NWDAF network element and the ID used to indicate that the UE 3 has a DDoS attack and/or generates unexpected high-rate or high-volume data, the control node will identify " ID_UE 3" is stored in the list, and a timer is started to count for 1 minute. Before the 1 minute timer expires, if the data processing node is not in a congested state, the control node can delete the identifier "ID_UE 3" from the list.
  • each list may correspond to a second duration. If the data processing node is not in the congested state within the second duration, the control node deletes the list corresponding to the second duration, or controls The node deletes the identities of all terminal devices in the list corresponding to the second duration.
  • the second durations corresponding to different lists may be the same or different.
  • the correspondence between the list and the second duration may be as shown in Table 2.
  • the control node may perform the timing of the second duration according to Table 2, and after the timing of the second duration expires, delete the list corresponding to the second duration, or delete all terminal device identifiers in the list corresponding to the second duration. It should be understood that the correspondences shown in Table 2 are merely examples.
  • the control node may determine the second duration corresponding to each list in a random manner, or may determine the second duration corresponding to each list through a protocol or a pre-configured manner.
  • the control node may store the identifiers of the second terminal devices received more times in a list, and set a longer second duration to correspond to the list.
  • the control node can store the identifier "ID_UE 4" in List 1, and set a shorter second duration corresponding to Table 1; For another example, the control node receives the identification “ID_UE 5” of the terminal device UE 2 from NWDAF more than once (for example, reaches or exceeds the threshold of the number of times), that is, the terminal device is more likely to cause congestion of the data processing node, and the control node may Store the identifier "ID_UE 5" in list 2, and set the longer second duration to correspond to list 2.
  • the control node may execute the timing of the second duration corresponding to the list since the new identifier is stored in the list. For example, when the control node receives the identifier "ID_UE 4" of the UE 4 from the NWDAF network element, the control node stores the identifier "ID_UE 4" in the list 1, and starts the timer to count for 1 minute. When the 1 minute timer expires Previously, if the data processing node is not in a congested state, the control node can delete list 1, or delete all the identifiers in list 1, and all the identifiers include "ID_UE 4".
  • control node may re-execute the timing of the second duration corresponding to the list every time the identification of a new terminal device is stored in a certain list. For example, in the above example, when the control node stores the identification "ID_UE 4" in list 1, and starts the timer to count for 1 minute, if the control node receives the identification "ID_UE 6" from the NWDAF network element before the timer expires 6", the control node can store the identifier "ID_UE 6" in list 1 and control the timer to re-execute for 1 minute.
  • control node may determine that the data processing node is in a congested state according to the received first instruction.
  • the first indication may include an identification of a data processing node in a congested state.
  • the first indication may be used to indicate that the data processing node is in a congested state, and after receiving the first indication, the control node may directly determine that the data processing node is in a congested state.
  • the first indication may be used to indicate the operating status of the data processing node, such as the central processing unit (CPU) usage rate, the data packet loss rate threshold, etc.
  • the control node After the control node receives the first indication , Determine whether the data processing node is in a congested state according to the first instruction combined with its own pre-allocated strategy.
  • the policy of the control node provisioning may include a running state threshold, such as a CPU usage threshold and/or a data packet loss rate threshold, and so on.
  • the UPF and/or NEF may send the first indication to the control node after being in a congested state.
  • the UPF and/or NEF sending the first instruction may also carry its own identity in the first instruction.
  • control node may further send a second instruction to the data processing node.
  • the second indication may be used to indicate to send the above first indication when the data processing node is in a congested state.
  • the first indication is used to indicate that the data processing node is in a congested state.
  • the second instruction may be used to instruct the data processing node to send the first instruction to the control node when a specific condition for sending the first instruction is met.
  • the first indication may be used to indicate the running status of the data processing node.
  • the specific condition may be a specific period, such as a period included in the second instruction.
  • the specific condition may be the occurrence of a specific event.
  • the data processing node may send an instruction to indicate the CPU usage rate after the CPU usage rate reaches (or exceeds) the usage rate threshold contained in the second instruction according to the second instruction And/or, the data processing node may send an indication of the data packet loss rate after the data packet loss rate reaches (or exceeds) the data packet loss rate threshold contained in the second instruction according to the second instruction The first instruction.
  • the control node may send the second instruction to the data processing node when establishing an N4 connection with the data processing node.
  • the data processing node determines that it is in a congested state, the data processing node sends a first instruction to the control node according to the second instruction.
  • the data processing node satisfies a specific condition, it may send the first instruction for the operating state to the control node according to the second instruction.
  • the control node may send a second instruction to the data processing node when establishing an SMF-NEF connection with the data processing node NEF.
  • the control node SMF carries the second indication in the SM Context Create Request (Nnef_SMContext_Create Request) message.
  • Nnef_SMContext_Create Request SM Context Create Request
  • the data processing node sends a first instruction to the control node according to the second instruction.
  • the data processing node satisfies the specific condition for sending the first instruction, it may send the first instruction for the operating state to the control node according to the second instruction.
  • NEF may send the first indication to AMF.
  • the NEF may send a first indication for indicating that the data processing node is in a congested state after determining that it is in a congested state.
  • the SMF can send a second instruction to the NEF, so that the NEF can send the first instruction to the control node AMF after being in a congested state.
  • the NEF may send the first instruction for the operating state to the control node when the specific condition for sending the first instruction is met.
  • the SMF may send a second instruction to the NEF, so that the NEF can send the first instruction when the specific condition for sending the first instruction is met.
  • the second indication in this example may be sent by AMF to SMF, or sent by AMF instructing SMF, or the second indication may be sent by SMF according to local configuration.
  • the second indication may include the identification of the control node AMF.
  • the SMF may send a second instruction to the NEF when establishing an SMF-NEF connection with the data processing node NEF.
  • the UPF and/or NEF may send the first instruction to the SMF, and the SMF sends the first instruction to the control node AMF.
  • the UPF and/or NEF may send a first indication for indicating that the UPF and/or NEF are in the congested state after determining that they are in the congested state.
  • the SMF can send the second instruction to the UPF and/or NEF, so that the UPF and/or NEF can send the first instruction to the control node AMF after being in a congested state.
  • the UPF and/or NEF may send the first indication for the operating state to the control node AMF when the specific condition for sending the first indication is met.
  • the SMF may send a second instruction to the UPF and/or NEF, so that the UPF and/or NEF can send the first instruction when the specific condition for sending the first instruction is met.
  • the second indication in this example may be sent by AMF to SMF, or sent by AMF instructing SMF, or the second indication may be sent by SMF according to local configuration.
  • the second indication may include the identification of the control node AMF.
  • the SMF may send the second instruction to the data processing node when establishing an N4 connection with the UPF.
  • control node may also determine that the data processing node is not in a congested state according to the received third instruction.
  • the third indication may include the identification of the data processing node.
  • the third indication may be used to indicate that the data processing node is not in a congested state.
  • the third indication may be sent after the data processing node determines that it is no longer in a congested state. For example, if the data processing node has been in a congested state for a long time, but has not entered the non-congested state from the congested state, the data processing node may not send the third instruction.
  • the third indication can be used to indicate the operating status of the data processing node, such as CPU usage rate, data packet loss rate, etc.
  • the control node After receiving the third indication, the control node combines its own pre-configured instructions according to the third indication. The strategy determines whether the data processing node is not in a congested state.
  • control node may further send a fourth instruction to the data processing node.
  • the fourth instruction may be used to instruct the data processing node to send the above third instruction when it is not in a congested state.
  • the third indication may be used to indicate that the data processing node is not in a congested state.
  • the fourth instruction may be used to instruct the data processing node to send the above third instruction when the specific condition for sending the third instruction is met.
  • the third indication may be used to indicate the running status of the data processing node.
  • the specific condition may be a specific period, such as the period included in the fourth instruction.
  • the specific condition may be the occurrence of a specific event.
  • the data processing node may report the CPU usage rate after the CPU usage rate has not reached (or less than) the usage rate threshold contained in the fourth instruction according to the fourth instruction, and /Or, according to the fourth instruction, the data processing node may report the data packet loss rate after the data packet loss rate has not reached (or is less than) the data packet loss rate threshold included in the fourth instruction.
  • the usage rate threshold contained in the fourth indication may be the same as or different from the usage threshold contained in the second indication.
  • the data packet loss rate threshold included in the fourth indication may be the same as or different from the data packet loss rate threshold included in the second indication.
  • the data processing node may determine whether it is in a congested state according to the usage rate and/or packet loss rate of its own processor. Specifically, when the CPU usage rate of the data processing node itself reaches (or exceeds) the first usage rate threshold (for example, 90%), the data processing node determines that it is in a congested state. In addition, when the packet loss rate when the data processing node forwards the data sent by the terminal device reaches (or exceeds) the first packet loss rate threshold (for example, 10%), the data processing node can determine that it is in a congested state.
  • the first usage rate threshold for example, 90%
  • the first usage rate threshold and/or the first packet loss rate threshold may be defined through a protocol or a pre-configured manner.
  • the first usage rate threshold and/or the first packet loss rate threshold may also be indicated by the control node.
  • the first usage rate threshold and/or the first packet loss rate threshold may be carried in the second indication.
  • the first usage rate threshold may be the same or different from the CPU usage threshold corresponding to the second indication.
  • the first packet loss rate threshold may be the same as or different from the data packet loss rate threshold corresponding to the second indication.
  • the data processing node determines that it is not in a congested state.
  • the data processing node may determine that it is not in a congested state. After determining that it is not in a congested state, the data processing node may send a third indication to the control node, where the third indication is used to indicate that the data processing node is not in a congested state.
  • the third indication may include the identification of the data processing node.
  • the second usage rate threshold and/or the second packet loss rate threshold may be defined through a protocol or a pre-configured manner.
  • the second usage rate threshold and/or the second packet loss rate threshold may also be indicated by the control node.
  • the second usage rate threshold and/or the second packet loss rate threshold may be carried in the above fourth indication. It should be understood that the above first usage rate threshold may be the same or different from the second usage rate threshold.
  • the above first packet loss rate threshold may be the same or different from the second packet loss rate threshold.
  • the second usage rate threshold may be the same as or different from the CPU usage threshold corresponding to the fourth indication.
  • the second packet loss rate threshold may be the same as or different from the data packet loss rate threshold corresponding to the fourth indication.
  • the storage overhead of terminal equipment also facilitates centralized processing of abnormal terminal equipment.
  • the data processing node can notify the control node to handle a large number of abnormal state terminal devices by using a small signaling overhead by means of notification, which reduces the storage overhead and processing overhead of the data processing node.
  • control node may send the first message to the multiple first terminal devices respectively.
  • the first message may include the identifier of the user plane connection.
  • the first message may be used to instruct the first terminal device to release the user plane connection to which the identifier belongs.
  • the first terminal device may release the user plane connection to which the identifier belongs according to the first message.
  • the control node may determine the first data processing node according to the identification of the data network (such as DNN) supported by at least two of the multiple data processing nodes In the user plane connection of the terminal device, access one or more user plane connections of the data network, and carry the identification of the one or more user plane connections in the first message to instruct the first terminal device to release the one Or multiple user plane connections.
  • the data network such as DNN
  • the identifier of the data network supported by the data processing node means that the data processing node supports the establishment of a user plane connection to the data network to which the identifier belongs.
  • the identification of the data network supported by the data processing node may be included in the context of the data processing node.
  • the context of the data processing node can be stored in the SMF connected to the data processing node.
  • control node includes SMF or AMF as an example for specific description.
  • control node can determine the identity of the data network supported by the multiple data processing nodes according to the respective contexts of the multiple data processing nodes stored by itself, and process at least two of the data network identities
  • the identifier of the data network jointly supported by the nodes serves as the identifier of the data network supported by at least two of the multiple data processing nodes.
  • the SMF stores UPF_1, UPF_2, and UPF_3 and other UPF contexts.
  • the SMF can be based on the respective contexts of UPF_1, UPF_2, and UPF_3. , Determine the corresponding relationship between the identifier of the data processing node and the DNN supported by the data processing node, as shown in Table 3.
  • ID of the data processing node DNN supported by data processing node ID_UPF_1 DNN_1, DNN_2 ID_UPF_2 DNN_3 ID_UPF_3 DNN_1, DNN_3
  • the SMF may determine, according to Table 3, the identifiers of the data networks supported by at least two data processing nodes among UPF_1, UPF_2, and UPF_3 as DNN_1 and DNN_3.
  • the SMF may query the context of the first terminal device to obtain all user plane connections of the first terminal device.
  • the SMF can carry the user plane connections for accessing DNN_1 and DNN_3 among all the user plane connections of the first terminal device in the first message.
  • the context of the first terminal device can be stored in the SMF.
  • the AMF may receive from the SMF the identifiers of the data networks supported by multiple data processing nodes, and use the identifiers of the data networks supported by at least two data processing nodes in the data network identifiers as multiple An identifier of a data network supported by at least two of the data processing nodes.
  • the SMF can respectively receive congestion indications from multiple data processing nodes in a congested state, where the congestion indications can be used to indicate that the data processing node is in a congested state.
  • the congestion indication may include the first indication described in this application.
  • the SMF can determine the identity of the data network supported by the multiple data processing nodes according to the respective contexts of the multiple data processing nodes stored by itself, and determine the identity of the data network supported by at least two data processing nodes in the identity of the data network.
  • the identifier is used as an identifier of a data network supported by at least two of the multiple data processing nodes.
  • the SMF may carry the identifier of the data network supported by at least two data processing nodes in the first instruction and send it to the AMF.
  • the SMF may send the first indication and the identification of the data network supported by the at least two data processing nodes to the AMF respectively through different messages.
  • SMF when SMF receives congestion indications from UPF_1, UPF_2, and UPF_3, SMF can determine the identification of the data network supported by at least two data processing nodes in UPF_1, UPF_2, and UPF_3 based on the correspondence in Table 3 as DNN_1 and DNN_3. The SMF can then carry DNN_1 and DNN_3 in the first instruction and send it to the AMF.
  • the first indication may also include identifiers of UPF_1, UPF_2, and UPF_3 to indicate that UPF_1, UPF_2, and UPF_3 are in a congested state.
  • the AMF may query the context of the first terminal device to obtain all user plane connections of the first terminal device.
  • the AMF can carry the user plane connections for accessing DNN_1 and DNN_3 among all the user plane connections of the first terminal device in the first message.
  • the context of the first terminal device can be stored in the AMF.
  • the first message may be used to instruct the first terminal device to release all user plane connections.
  • the first message may be used to instruct the first terminal device to release all user plane connections.
  • the first message may carry indication information (which may be referred to as the fifth indication in this application), and the fifth indication may be used to instruct the first terminal device not to send the response message corresponding to the first message, so as to reduce The effect of the response message corresponding to the first message on the data processing node.
  • indication information which may be referred to as the fifth indication in this application
  • the above user plane connection may be a PDU session
  • the above first message may be a PDU session release message
  • the above first message may be carried in a NAS session management (session management, SM) message.
  • NAS session management session management, SM
  • the above first message can be carried in a NAS message.
  • the control node may send the first user plane connection establishment request to the first terminal device after receiving the first user plane connection establishment request from the first terminal device
  • the corresponding rejection response indicates that the user plane connection establishment request of the first terminal device is rejected according to the user plane connection establishment request. Therefore, after the data processing node is in a congested state, the SMF prohibits the first terminal device from establishing a new user plane connection, so as to reduce the occupation of the data processing node by the first terminal device.
  • the rejection response may also be used to instruct the first terminal device not to send the user plane connection establishment request within the third time period.
  • the rejection response may include the third duration, or include information for indicating the third duration.
  • the third duration can also be determined by agreement or pre-configuration.
  • the control node after the control node receives the third instruction, that is, after the control node determines that the data processing node is not in a congested state, the control node no longer restricts the first terminal device to establish a new user plane connection. Specifically, after receiving the third instruction, if a second user plane connection establishment request is received from the first terminal device, the control node may send an acceptance response corresponding to the second user plane connection establishment request to the first terminal device, To indicate acceptance of establishing the user plane connection of the first terminal device according to the second user plane connection establishment request.
  • the above rejection response may carry indication information for instructing the first terminal device not to send the response message corresponding to the rejection response, so as to reduce the effect of the response message corresponding to the rejection response on the data processing node.
  • the above rejection response can be carried in the NAS SM message.
  • the control node may send a rejection response corresponding to the first signaling connection establishment request to the first terminal device after receiving the first signaling connection establishment request from the first terminal device, To indicate refusal to establish the signaling connection of the first terminal device according to the signaling connection establishment request. Therefore, after the data processing node is in a congested state, the SMF prohibits the first terminal device from establishing a new signaling connection, so as to reduce the occupation of the data processing node by the first terminal device.
  • the rejection response may also be used to instruct the first terminal device not to send the signaling connection establishment request within the fourth time period.
  • the rejection response may include the fourth duration, or include information for indicating the fourth duration.
  • the fourth duration can also be determined by agreement or pre-configuration.
  • the control node after the control node receives the third instruction, that is, after the control node determines that the data processing node is not in a congested state, the control node no longer restricts the first terminal device to establish a new signaling connection. Specifically, after receiving the third indication, if a second signaling connection establishment request from the first terminal device is received, the control node may send an acceptance response corresponding to the second signaling connection establishment request to the first terminal device, To indicate acceptance of establishing the signaling connection of the first terminal device according to the second signaling connection establishment request.
  • the above rejection response may carry indication information for instructing the first terminal device not to send the response message corresponding to the rejection response, so as to reduce the effect of the response message corresponding to the rejection response on the data processing node.
  • the above rejection response can be carried in a NAS message.
  • the control node may also send a second message to the first terminal device, and the second message may be used to instruct to set the location of the first terminal device as an unsupported area , The unsupported area does not support the first terminal device's request to establish a signaling connection. Therefore, the AMF can configure the first terminal device through the second message to instruct the first terminal device not to request the establishment of a new signaling connection, so as to reduce the effect of the process of establishing a new signaling connection on the data processing node.
  • the above second message may include a UE configuration update message, which is used to instruct the first terminal device to update a mobility restriction list (mobility restriction).
  • the AMF can set the current location of the first terminal device in the mobility restriction list as a non-allowed area through the second message.
  • the first terminal device updates the configuration according to the mobility restriction list, and can set the first terminal device to The location of the device is set to an unsupported area.
  • the above second message may carry indication information for instructing the first terminal device not to send the response message corresponding to the second message, so as to reduce the effect of the response message corresponding to the second message on the data processing node.
  • the above second message can be carried in a NAS message.
  • the control node may also send a third message to the first terminal device.
  • the third message may be used to indicate the QoS level setting corresponding to the user plane connection of the first terminal device It is the first QoS level, where the first QoS level is lower than the current QoS level of the user plane connection. Therefore, the occupation of the data processing node by the first terminal device can be reduced by reducing the service quality of the first terminal device.
  • the first QoS level may be a preset QoS level, for example, the first QoS level is a QoS level that characterizes the lowest QoS.
  • the first QoS level may also be a QoS level determined according to the current QoS level of the user plane connection.
  • the first QoS level is a QoS level N lower than the current QoS level of the user plane connection, and N is a positive integer.
  • the second message may carry information for indicating the first QoS level, such as carrying an identifier of the first QoS level to indicate the first QoS level.
  • the third message may carry an identifier of the user plane connection, and is used to instruct the abnormal terminal device to set the QoS level of the user plane connection to which the identifier belongs to the first QoS level.
  • the manner in which the SMF determines the identifier of the user plane connection can refer to the introduction when the SMF determines the user plane connection in the first message.
  • the third message may be used to instruct the first terminal device to set the QoS level of all its user plane connections to the first QoS level.
  • the third message may be used to instruct the first terminal device to set the QoS levels of all user plane connections to the first QoS level.
  • the third message may carry a Policy and Charging Control (PCC) rule, and the PCC rule is used to instruct the abnormal terminal device to reduce the QoS level of the user plane connection.
  • the SMF can also send the PCC rule to the data processing node for the data processing node to reduce the QoS level of the corresponding user plane connection according to the PCC rule, and provide business services to abnormal terminal devices according to the reduced QoS level.
  • PCC Policy and Charging Control
  • the above third message may carry indication information for instructing the first terminal device not to send the response message corresponding to the third message, so as to reduce the effect of the response message corresponding to the third message on the data processing node.
  • the above user plane connection may be a PDU session
  • the above third message may be a PDU session modification message.
  • the above third message can be carried in the NAS SM message.
  • control node and the data node are the same node, for example, both are SMF
  • the SMF determines that it belongs to the congested state
  • it can perform the steps shown in S102 and send the first message to the first terminal device, where the first message It may include the content sent by the SMF in S102 introduced in the above embodiment.
  • the control node and the data node are both AMF, after the AMF determines that it belongs to the congested state, it can perform the steps shown in S102 to send a first message to the first terminal device, where the first message may include the information described in the above embodiment The content sent by AMF in S102.
  • the SMF can perform congestion control in response to the congestion state of the data processing node, so as to reduce the data occupation of the data processing node.
  • a congestion control method provided in an embodiment of the present application may include the following steps:
  • S201 The AF and/or NWDAF sends the identifier of the second terminal device to the SMF.
  • the SMF receives the identification of the second terminal device from the AF and/or NWDAF.
  • the SMF may also receive an identifier of the abnormal state of the second terminal device from the AF and/or NWDAF.
  • NWDAF can detect DDoS attacks or other abnormal behaviors in one or more terminal devices according to the prior art.
  • one or more terminal devices with abnormal behaviors are the second terminal devices.
  • NWDAF can The identification of the second terminal device is sent to the SMF.
  • the terminal device ID may be an internal identifier of the mobile network, such as SUPI, international mobile equipment identity (IMEI), internal group identifier (internal group ID), tracking area code (TAC), etc.
  • the SEDF may also send an abnormal behavior ID to the SMF, such as an ID used to indicate the abnormal behavior of the terminal device.
  • an AF when an AF is a security detection device such as a firewall, an intrusion detection system, etc., the AF can detect traffic that has security threats through a security detection algorithm based on user plane data flowing through the AF. At this time, AF first detects the external identity of malicious traffic, such as IP address or GPSI, and sends the external identity to NEF. NEF maps the external identity to the internal identity of the second terminal device, where the internal identity is for example SUPI, IMEI, internal group ID, TAC, etc. Thereafter, the NEF can send the internal identity of the second terminal device to the SMF.
  • the AF may also send the abnormal behavior ID to the SMF to facilitate management of second terminal devices with the same abnormal behavior ID.
  • S202 SMF storage list, the list includes the identifier of the second terminal device.
  • the list may include the identification of the second terminal device.
  • the data processing node After determining that it is in a congested state, the data processing node sends a first indication to the SMF to indicate that the data processing node is in a congested state.
  • the SMF receives the first instruction from the data processing node, and determines that the data processing node is in a congested state according to the first instruction.
  • the first indication includes an identifier of the data processing node.
  • the above data processing node may include UPF and/or NEF.
  • the SMF may also send a second instruction to the data processing node for instructing the data processing node to send the above first instruction to the SMF after being in a congested state.
  • the second indication may include the first occupancy rate threshold and/or the first packet loss rate threshold.
  • the SMF sends a first message to the first terminal device corresponding to the identifier of the terminal device in the list, where the first message is used to instruct the first terminal device to release the user plane connection.
  • the first terminal device receives the first message.
  • the first message may carry the identifier of the user plane connection.
  • the SMF may select one or more first terminal devices from the terminal devices to which the identifiers in the list belong according to the list shown in S202, and send the first message to the one or more first terminal devices.
  • the SMF timing reaches a certain duration
  • the identifier corresponding to the duration can be deleted from the list, or the list corresponding to the duration can be deleted. Therefore, the SMF can be listed in the above list and the identifier in the list.
  • the first terminal device to which the identifier in the list belongs is controlled.
  • the SMF may delete the entire list corresponding to the second duration, or delete all identifiers from the list.
  • the above first message may carry a fifth indication, and the fifth indication may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • the SMF may send a rejection response corresponding to the user plane establishment request to the first terminal device. Further, the rejection response corresponding to the user plane establishment request may also be used to instruct the first terminal device to not send the user plane establishment request within the third time period.
  • the SMF may also replace the above first message with a third message, where the third message is used to indicate that the QoS level corresponding to the user plane connection of the first terminal device is set to the first QoS level.
  • the third message may also carry the identifier of the user plane connection.
  • the above third message may carry indication information, and the indication information may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • S205 The first terminal device releases the user plane connection according to the first message.
  • the first terminal device may release the user plane connection to which the identifier belongs. Or, when the first message does not contain the identifier of the user plane connection, the first terminal device may release all its user plane connections.
  • the first terminal device may also respond to the fifth indication and ignore sending the response message corresponding to the first message to the SMF.
  • the first terminal device can set the QoS level corresponding to the user plane connection of the first terminal device to the first QoS level according to the third message.
  • the third message includes the identifier of the user plane connection
  • the first terminal device may set the QoS level of the user plane connection to which the identifier belongs to the first QoS level.
  • the third message does not include the identifier of the user plane connection
  • the first terminal device may set the QoS level of all user plane connections to the first QoS level.
  • the first terminal device may respond to the indication information and ignore sending a response message corresponding to the third message to the SMF.
  • the data processing node sends a third indication to the SMF.
  • the third indication may be used to indicate that the data processing node is not in a congested state.
  • the SMF may also send a fourth instruction to the data processing node for instructing the data processing node to send the above third instruction to the SMF when it is not in a congested state.
  • the fourth indication may include a second occupancy rate threshold and/or a second packet loss rate threshold.
  • the SMF determines that the data processing node is not in a congested state according to the third instruction.
  • the SMF no longer prohibits the establishment of the user plane connection of the first terminal device. Specifically, if the SMF receives the user plane connection establishment request from the first terminal device, the SMF may send an acceptance response corresponding to the user plane connection establishment request to the first terminal device.
  • the SMF may perform the steps shown in S208 after some or all of the data processing nodes in the congested state in S203 are not in the congested state.
  • the congestion control method provided by the embodiment of the present application when the control node includes AMF is introduced.
  • the AMF can perform congestion control in response to the congestion state of the data processing node, so as to reduce the data occupation of the data processing node.
  • the congestion control method when executed by the AMF, the congestion control method provided in the embodiment of the present application may include the following steps:
  • S301 The AF and/or NWDAF sends the identifier of the second terminal device to the AMF.
  • the AMF receives the identification of the second terminal device from the AF and/or NWDAF.
  • the AMF may also receive an identifier of the abnormal state of the second terminal device from the AF and/or NWDAF.
  • S302 AMF storage list, which includes the identifier of the second terminal device.
  • the data processing node After determining that it is in a congested state, the data processing node sends a first indication to the SMF, where the first indication is used to indicate that the data processing node is in a congested state.
  • the first indication may include the identification of the data processing node in a congested state.
  • the SMF receives the first instruction from the data processing node.
  • the above data processing node may include UPF and/or NEF.
  • the SMF may send a second instruction to the data processing node.
  • the second instruction is used to instruct the data processing node to send the above first instruction to the SMF after being in a congested state.
  • the second indication may include the first occupancy rate threshold and/or the first packet loss rate threshold.
  • S304 The SMF sends the first instruction to the AMF.
  • the AMF receives the first instruction, and determines that the data processing node is in a congested state according to the first instruction.
  • the SMF sends a second instruction to the data processing node.
  • the second indication includes the AMF identifier.
  • the second instruction is used to instruct the data processing node to send the first instruction to the AMF after being in a congested state.
  • S306 After determining that the data processing node is in the congested state, it sends a first indication to the AMF according to the second indication, where the first indication is used to indicate that the data processing node is in the congested state.
  • the AMF receives the first instruction, and determines that the data processing node is in a congested state according to the first instruction.
  • the AMF sends a first message to the first terminal device corresponding to the identifier of the terminal device in the list, where the first message is used to instruct the first terminal device to release the user plane connection.
  • the first terminal device receives the first message.
  • the first message may carry the identifier of the user plane connection.
  • the above first message may carry a fifth indication, and the fifth indication may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • the AMF After determining that the data processing node is in a congested state according to the above S304 or S306, if the AMF receives a signaling request from the first terminal device, the AMF sends a rejection response corresponding to the signaling establishment request to the first terminal device. Further, the rejection response corresponding to the signaling establishment request may also be used to indicate that the first terminal device does not send the signaling establishment request within the fourth time period.
  • the AMF may send a second message to the first terminal device.
  • the second message may be used to instruct to set the location of the first terminal device as an unsupported area.
  • the unsupported area does not support the first terminal device's request to establish a signaling connection.
  • the above second message may carry indication information, and the indication information may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • S308 The first terminal device releases the user plane connection according to the first message.
  • the first terminal device may release the user plane connection to which the identifier belongs. Or, when the first message does not contain the identifier of the user plane connection, the first terminal device may release all its user plane connections.
  • the first terminal device may also respond to the fifth indication and ignore sending the response message corresponding to the first message to the SMF.
  • the first terminal device can set the location of the first terminal device as an unsupported area according to the second message, so that no signaling connection establishment request is sent.
  • S309 The data processing node determines that it is no longer in a congested state.
  • the data processing node sends a third indication to the SMF.
  • the third indication may be used to indicate that the data processing node is not in a congested state.
  • the third indication may include the identification of the data processing node.
  • the SMF receives the first instruction from the data processing node.
  • the SMF may also send a fourth instruction to the data processing node for instructing the data processing node to send the above third instruction to the SMF when it is not in a congested state.
  • S311 The SMF sends a third instruction to the AMF.
  • the AMF receives the third indication.
  • the above steps S309 to S311 can also be replaced with S312 and S313.
  • the SMF sends a fourth instruction to the data processing node.
  • the fourth indication includes the AMF logo.
  • the fourth instruction is used to instruct the data processing node to send the third instruction to the AMF when it is not in a congested state.
  • the data processing node determines that it is no longer in the congested state, and sends a third instruction to the AMF according to the fourth instruction, where the third instruction is used to indicate that the data processing node is in the congested state.
  • the third indication may include the identification of the data processing node.
  • the AMF receives the third indication.
  • the AMF determines that the data processing node is not in a congested state.
  • the third indication may be received by the AMF through S311 or S313.
  • the AMF no longer prohibits the establishment of the signaling connection of the first terminal device. Specifically, if the AMF receives the signaling establishment request from the first terminal device, the AMF may send an acceptance response corresponding to the signaling establishment request to the first terminal device.
  • the AMF may perform the steps shown in S313 after some or all of the data processing nodes in the congested state in S304 or S306 are not in the congested state.
  • the congestion control method provided in the embodiments of the present application may also be executed by a data processing node, where the data processing node includes UPF and/or NEF.
  • the method may include the following steps as shown in FIG. 5:
  • S401 AF and/or NWDAF send an identifier of the second terminal device to SMF.
  • the SMF may also receive the address of the victim of the abnormal behavior identified by the AF and/or NWDAF from the AF and/or NWDAF.
  • the victim address is, for example, an IP address or a media access control (MAC) address of the victim of the DDoS attack of the second terminal device.
  • the address of the victim of the abnormal behavior corresponds to the second terminal device with the abnormal behavior.
  • the SMF maps the identifier of the second terminal device to the address of the second terminal device.
  • the address of the second terminal device can be used by the data processing node to identify the second terminal device.
  • the address of the second terminal device may include an IP address. If the data processing node includes NEF, the address of the second terminal device may include a MAC address.
  • the SMF can also map the victim address into a packet filter through the PCF.
  • the data packet filter may be composed of IP addresses, for example, the source IP address is all 0s and the target IP address is the victim IP address, or the source IP address is the IP address of the first terminal device and the target IP is the victim IP address.
  • the packet filter can also be composed of MAC.
  • the source MAC address is all 0s and the destination MAC address is the victim MAC address, or the source MAC address is the UE MAC address and the destination MAC address is the victim MAC address.
  • S403 The SMF sends the address of the second terminal device to the data processing node.
  • the data processing node receives the address of the second terminal device.
  • the SMF may send the packet filter to the data processing node.
  • the data processing node stores a list, and the list includes the address of the second terminal device.
  • the data processing node can store the address list of the terminal device in the abnormal state.
  • the list may include the address of the second terminal device and the correspondence between the data packet filter.
  • the data processing node may set the third duration corresponding to the address of the second terminal device, or set the fourth duration corresponding to the list.
  • the setting method and usage rules of the third duration can refer to the aforementioned first duration.
  • the setting method and usage rules of the fourth duration please refer to the aforementioned second duration.
  • S405 The data processing node determines that it is in a congested state.
  • S406 The data processing node discards the uplink data packet from the address of the first terminal device included in the list.
  • the data processing section determines whether the source IP address of the data packet that needs to be forwarded is included in the list, and if so, the data processing node may discard the data packet.
  • the data processing node may discard the data packet according to the corresponding relationship. For example, when the source IP address in the data packet filter is all 0 and the destination IP address is the victim IP address, the data processing node obtains all the data packets sent by this address according to the address in the list, and discards the destination IP according to the packet filter A packet with the IP address of the victim.
  • the method may further include the following steps:
  • S407 The data processing node determines that it is no longer in a congested state.
  • S408 The data processing node no longer discards the data packet according to the addresses included in the list.
  • the AMF can perform congestion control in response to the congestion state of the data processing node SMF, so as to reduce the data occupation of the data processing node.
  • S501 The AF and/or NWDAF sends the identifier of the second terminal device to the AMF.
  • the AMF receives the identification of the second terminal device from the AF and/or NWDAF.
  • the AMF may also receive an identifier of the abnormal state of the second terminal device from the AF and/or NWDAF.
  • S502 AMF storage list, which includes the identifier of the second terminal device.
  • the list may include the identification of the second terminal device.
  • the data processing node SMF sends a first instruction to the AMF.
  • the first indication is used to indicate that the SMF is in a congested state, and the first indication may be sent after the SMF determines that it enters the congested state.
  • the data processing node SMF may send a first instruction to the AMF when a specific condition for sending the first instruction is met, and the first instruction may be used to indicate the operating state of the SMF.
  • the first indication may include an SMF identifier.
  • the AMF receives the first indication from the SMF.
  • the AMF may send a second instruction to the data processing node SMF.
  • the second instruction is used to instruct the data processing node SMF to send the above first instruction to the AMF after being in a congested state.
  • the second indication may include the first occupancy rate threshold and/or the first packet loss rate threshold.
  • the second instruction may be used to instruct the SMF to send a first instruction for indicating the operating state of the SMF to the AMF when the specific condition for sending the first instruction is met.
  • the AMF determines that the SMF is in a congested state according to the first indication.
  • the AMF sends a first message to the first terminal device, where the first message is used to instruct the first terminal device to release the user plane connection.
  • the first terminal device receives the first message.
  • the first message may carry the identifier of the user plane connection.
  • the above first message may carry a fifth indication, and the fifth indication may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • the AMF After determining that the data processing node is in a congested state, if the AMF receives the signaling request from the first terminal device, the AMF sends a rejection response corresponding to the signaling establishment request to the first terminal device. Further, the rejection response corresponding to the signaling establishment request may also be used to indicate that the first terminal device does not send the signaling establishment request within the fourth time period.
  • the AMF may send a second message to the first terminal device.
  • the second message may be used to indicate that the location of the first terminal device is set as an unsupported area, and the unsupported area does not support
  • the first terminal device requests the establishment of a signaling connection.
  • the above second message may carry indication information, and the indication information may be used to instruct the first terminal device not to send a response message corresponding to the first message.
  • S506 The first terminal device releases the user plane connection according to the first message.
  • the first terminal device may release the user plane connection to which the identifier belongs. Or, when the first message does not contain the identifier of the user plane connection, the first terminal device may release all its user plane connections.
  • the first terminal device may also respond to the fifth indication and ignore sending the response message corresponding to the first message to the SMF.
  • the first terminal device can set the location of the first terminal device as an unsupported area according to the second message, so that no signaling connection establishment request is sent.
  • the data processing node SMF sends a third instruction to the AMF.
  • the third indication may include the identification of the data processing node.
  • the third indication may be used to indicate that the SMF is no longer in a congested state. At this time, the third indication may be sent after the SMF determines that it is not in a congested state.
  • the third indication may be used to indicate the operating status of the SMF.
  • the third indication may be sent by the SMF after satisfying a specific condition for sending the third indication.
  • the SMF receives the first instruction from the data processing node.
  • the AMF may also send a fourth instruction to the SMF.
  • the fourth indication may be used to indicate that the SMF sends a third indication for indicating that the data processing node is not in a congested state to the SMF when it is not in a congested state.
  • the fourth instruction may be used to instruct the SMF to send a third instruction for indicating the operating state of the SMF after satisfying a specific condition for sending the third instruction.
  • S508 The AMF determines that the data processing node is not in a congested state according to the third instruction.
  • the AMF no longer prohibits the establishment of the signaling connection of the first terminal device. Specifically, if the AMF receives the signaling establishment request from the first terminal device, the AMF may send an acceptance response corresponding to the signaling establishment request to the first terminal device.
  • an embodiment of the present application also provides a communication device, which may have the function of any one of the control node, the first terminal device or the data processing node in the above method embodiment , And can be used to execute the steps provided by any one of the control node, the first terminal device or the data processing node provided by the above method embodiment.
  • This function can be realized by hardware, or by software or hardware executing corresponding software.
  • the hardware or software includes one or more modules corresponding to the above-mentioned functions.
  • the communication device 700 shown in FIG. 7 may be used as the control node involved in the foregoing method embodiment, and execute the steps performed by the control node in the foregoing method embodiment.
  • the control node may include SMF and/or AMF.
  • the communication device 700 may include a communication module 701 and a processing module 702, and the communication module 701 and the processing module 702 are coupled with each other.
  • the communication module 701 may be used to support the communication device 700 to communicate.
  • the communication module 701 may have a wired communication function, for example, it can communicate with other network elements in a wired manner.
  • the processing module 702 can be used to support the communication device 700 to perform the processing actions in the foregoing method embodiments, including but not limited to: generating information and messages sent by the communication module 701, and/or demodulating the signals received by the communication module 701 Decoding and so on.
  • the above processing module 702 can be used to determine that the data processing node is in a congested state, and the data processing node is used to process data sent by the terminal device; the above communication module 701 can be used to The first terminal device corresponding to the identification of the terminal device in the list stored by the control node sends the first message, and the identification of the terminal device in the list is the abnormal state received by the control node The identifier of the first terminal device, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the communication module 701 may also receive an identifier of the second terminal device, which is a terminal device in an abnormal state.
  • Each of the above second terminal devices meets any one or more of the following conditions: there is a distributed denial of service DDoS attack during the transmission of the user plane data of the second terminal device; or, the target of the user plane data of the second terminal device The address is wrong; or, the user plane data whose transmission time length of the user plane data of the second terminal device reaches the threshold duration; or, the user plane data whose data length of the user plane data of the second terminal device reaches the threshold length; or, the second terminal The transmission rate of the user plane data of the device reaches the user plane data of the threshold rate.
  • the above processing module 702 may also delete the identifier of the second terminal device from the list.
  • the processing module 702 may also delete the list, or delete all the identifiers in the list.
  • the above communication module 701 may also be configured to receive a first indication, which is used to indicate that the data processing node is in the congested state; the above processing module 702 may determine that the data processing node is in a congested state according to the first indication.
  • the above communication module 701 may also send a second instruction to the data processing node, where the second instruction is used to instruct the data processing node to send the first instruction when in the congested state.
  • the above first message may include the identifier of the user plane connection.
  • the above processing module 702 may also determine the identity of the data network according to the respective contexts of the multiple data processing nodes. At least two data processing nodes of the plurality of data processing nodes support the data network, the respective contexts of the plurality of data processing nodes are stored in the control node, and the context of each data processing node includes the data The identification of the data network supported by the processing node; and, the processing module 702 may determine the identification of the user plane connection according to the context of the first terminal device and the identification of the data network, and the context of the first terminal device is stored in the control node , The context of the first terminal device includes the identifier of the user plane connection that accesses the data network.
  • the above communication module 701 can also be used to receive the identification of the data network from the SMF, and the multiple data processing nodes At least two data processing nodes in the node support the data network; the above processing module 702 can also be used to determine the identity of the user plane connection according to the context of the first terminal device and the identity of the data network.
  • the context is stored in the control node, and the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • the above communication module 701 may also send the rejection to the first terminal device after receiving the first user plane connection establishment request from the first terminal device.
  • the rejection response corresponds to the first user plane connection establishment request, and the rejection response is used to instruct the first terminal device not to send the user plane connection establishment request within the third time period.
  • the above processing module 702 can also be used to determine that the data processing node is not in the congested state, and the above communication module 701 can also send to the first terminal device after receiving the second user plane connection establishment request from the first terminal device The acceptance response corresponds to the second user plane connection establishment request.
  • the above communication module 701 may also send a rejection response to the first terminal device after receiving the first signaling connection establishment request from the first terminal device
  • the rejection response corresponds to the first signaling connection establishment request, and the rejection response is used to indicate that the abnormal terminal device does not send the signaling connection establishment request within the fourth time period.
  • the above processing module 702 can also be used to determine that the data processing node is not in the congested state, and the communication module 701 can also send to the first terminal device after receiving the second signaling connection establishment request from the first terminal device The acceptance response corresponds to the second signaling connection establishment request.
  • the above communication module 701 may also be used to receive a third indication, which is used to indicate that the data processing node is not in the congested state.
  • the above processing module 702 can determine that the data processing node is not in the congested state according to the third instruction.
  • the communication module 701 may also send a fourth instruction to the data processing node, where the fourth instruction is used to instruct the data processing node to send the third instruction when it is not in the congested state.
  • the communication module 701 may also be used to send a second message to the first terminal device, and the second message may be used to indicate that the location of the first terminal device is set as an unsupported area, and the unsupported area The first terminal device's request to establish a signaling connection is not supported.
  • the above first message may include a fifth indication, and the fifth indication is used to indicate that the first terminal device does not reply to the first message.
  • the communication device provided in the embodiment of the present application may also be composed of hardware components, such as a processor, a memory, or a communication interface.
  • the communication device 800 may include a communication interface 801, a memory 802, and a processor 803.
  • the communication interface 801 can be used for the communication device 800 to communicate, for example, for sending or receiving signals.
  • the communication interface 801 can be used for the communication device 800 to send and receive signals in a wired manner.
  • the communication interface 801 can be used for the communication device 800 to connect with core networks such as AMF, AF, NWDAF, UPF, or NEF.
  • core networks such as AMF, AF, NWDAF, UPF, or NEF.
  • the network elements connected to the network communicate.
  • the communication interface 801 may be used for the communication device 800 to communicate with core network or access network elements such as SMF, AF, NWDAF, UPF, or NEF.
  • the memory 802 may be coupled with the processor 803, and is used to store programs and data necessary for the communication device 800 to implement various functions.
  • the processor 803 is configured to support the communication device 800 to perform the corresponding processing functions in the above method, such as generating information and messages sent by the communication interface 801, and/or demodulating and decoding signals received by the communication interface 801, and so on.
  • the above memory 802 and the processor 803 may be integrated or independent of each other.
  • the above memory 802 and/or the communication interface 801 may also be externally connected to the communication device 800. If the memory 802 and the communication interface 801 are both externally connected to the communication device 800, the communication device 800 may include the processor 803 at this time.
  • the above communication module 701 may have the structure shown in the communication interface 801.
  • the above processing module 702 may include a processor 803, or include a processor 803 and a memory 802.
  • the above communication device 800 may also be composed of a chip.
  • the chip includes a processor 803.
  • the chip may also include a memory 802 and a communication interface 801.
  • the memory 802, the communication interface 801 and the processor 803 can be coupled to each other.
  • the above steps executed by the processing module 702 can be executed by the processor 803, and the above steps executed by the communication module 701 can be executed by the communication interface 801.
  • the memory 802 may be used to store a program for the processor 803 to call the program to execute the steps performed by the processing module 702 above.
  • the above processor 803 can be used to determine that the data processing node is in a congested state, and the data processing node is used to process data sent by the terminal device; It can be used to send a first message to the first terminal device corresponding to the identification of the terminal device in the list stored by the control node, where the identification of the terminal device in the list is in an abnormal state received by the control node.
  • the identifier of the first terminal device, the first message is used to instruct to release a user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the communication interface 801 may also receive an identifier of the second terminal device, which is a terminal device in an abnormal state.
  • Each of the above second terminal devices meets any one or more of the following conditions: there is a distributed denial of service DDoS attack during the transmission of the user plane data of the second terminal device; or, the target of the user plane data of the second terminal device The address is wrong; or, the user plane data whose transmission time length of the user plane data of the second terminal device reaches the threshold duration; or, the user plane data whose data length of the user plane data of the second terminal device reaches the threshold length; or, the second terminal The transmission rate of the user plane data of the device reaches the user plane data of the threshold rate.
  • the above processor 803 may also delete the identifier of the second terminal device from the list.
  • the processor 803 may also delete the list, or delete all the identifiers in the list.
  • the above communication interface 801 may also be used to receive a first indication, which is used to indicate that the data processing node is in the congested state; the above processor 803 may determine that the data processing node is in the congested state according to the first indication.
  • the above communication interface 801 may also send a second instruction to the data processing node, where the second instruction is used to instruct the data processing node to send the first instruction when in the congested state.
  • the above first message may include the identifier of the user plane connection.
  • the above processor 803 may also determine the identity of the data network according to the respective contexts of the multiple data processing nodes, At least two data processing nodes of the plurality of data processing nodes support the data network, the respective contexts of the plurality of data processing nodes are stored in the control node, and the context of each data processing node includes the data The identifier of the data network supported by the processing node; and, the processor 803 may determine the identifier of the user plane connection according to the context of the first terminal device and the identifier of the data network, and the context of the first terminal device is stored in the control node , The context of the first terminal device includes the identifier of the user plane connection that accesses the data network.
  • the above communication interface 801 can also be used to receive the identification of the data network from the SMF, and the multiple data processing nodes At least two data processing nodes in the node support the data network; the above processor 803 may also be configured to determine the identity of the user plane connection according to the context of the first terminal device and the identity of the data network, and the identity of the first terminal device The context is stored in the control node, and the context of the first terminal device includes an identifier of the user plane connection that accesses the data network.
  • the above communication interface 801 may also send the rejection to the first terminal device after receiving the first user plane connection establishment request from the first terminal device.
  • the rejection response corresponds to the first user plane connection establishment request, and the rejection response is used to instruct the first terminal device not to send the user plane connection establishment request within the third time period.
  • the above processor 803 may also be used to determine that the data processing node is not in the congested state, and the above communication interface 801 may also send to the first terminal device after receiving the second user plane connection establishment request from the first terminal device The acceptance response corresponds to the second user plane connection establishment request.
  • the above communication interface 801 can also send a rejection response to the first terminal device after receiving the first signaling connection establishment request from the first terminal device
  • the rejection response corresponds to the first signaling connection establishment request, and the rejection response is used to indicate that the abnormal terminal device does not send the signaling connection establishment request within the fourth time period.
  • the above processor 803 may also be used to determine that the data processing node is not in the congested state, and the communication interface 801 may also send to the first terminal device after receiving the second signaling connection establishment request from the first terminal device The acceptance response corresponds to the second signaling connection establishment request.
  • the above communication interface 801 can also be used to receive a third indication, which is used to indicate that the data processing node is not in the congested state.
  • the above processor 803 may determine, according to the third instruction, that the data processing node is not in the congested state.
  • the communication interface 801 may also send a fourth instruction to the data processing node, where the fourth instruction is used to instruct the data processing node to send the third instruction when it is not in the congested state.
  • the communication interface 801 may also be used to send a second message to the first terminal device.
  • the second message may be used to indicate that the location of the first terminal device is set as an unsupported area, and the unsupported area The first terminal device's request to establish a signaling connection is not supported.
  • the above first message may include a fifth indication, and the fifth indication is used to indicate that the first terminal device does not reply to the first message.
  • the communication device 900 shown in FIG. 9 can be used as the first terminal device involved in the foregoing method embodiment, and executes the steps executed by the first terminal device in the foregoing method embodiment.
  • the first terminal device may include the UE or terminal device described in this application.
  • the communication device 900 may include a communication module 901 and a processing module 902, and the communication module 901 and the processing module 902 are coupled with each other.
  • the communication module 901 may be used to support the communication device 900 to communicate, and the communication module 901 may have a wireless communication function.
  • the processing module 902 can be used to support the communication device 900 to perform the processing actions in the foregoing method embodiments, including but not limited to: generating information and messages sent by the communication module 901, and/or demodulating the signals received by the communication module 901 Decoding and so on.
  • the communication module 901 can be used to receive a first message from the control node, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit the
  • the communication device provided in the embodiment of the present application may also be composed of hardware components, such as a processor, a memory, or a transceiver.
  • the communication device When the communication device is the above first terminal device, its structure may also be as shown in FIG. 10. It is easy to understand and easy to illustrate.
  • a mobile phone is taken as an example to illustrate the structure of the communication device 1000.
  • the communication device 1000 may include a processor 1001, a memory 1002, and a transceiver 1003.
  • the above processor 1001 can be used to process the communication protocol and communication data, and to control the first terminal device, execute the software program, process the data of the software program, and so on.
  • the memory 1002 may be used to store programs and data, and the processor 1001 may execute the method executed by the first terminal device in the embodiment of the present application based on the program.
  • the transceiver 1003 may include a radio frequency unit and an antenna.
  • the radio frequency unit can be used for conversion of baseband signals and radio frequency signals and processing of radio frequency signals.
  • the antenna can be used to send and receive radio frequency signals in the form of electromagnetic waves.
  • the radio frequency unit may only be regarded as the transceiver 1003, then the communication device 1000 may include a processor 1001, a memory 1002, a transceiver 1003, and an antenna at this time.
  • the communication device 1000 may further include an input/output device 1004, such as a touch screen, a display screen, or a keyboard, etc., which can be used to receive data input by the user and output data to the user. It should be noted that some types of communication devices may not have input and output devices.
  • the above communication module 901 may have the structure shown in the transceiver 1003, that is, include a radio frequency unit and an antenna; or, the communication module 901 may include the above radio frequency unit.
  • the above processing module 902 may include a processor 1001, or include a processor 1001 and a memory 1002.
  • the above communication device 1000 may also be composed of a chip.
  • the chip includes a processor 1001.
  • the chip may also include a memory 1002 and a transceiver 1003, wherein the memory 1002, the transceiver 1003 and the processor 1001 can be coupled to each other.
  • the transceiver 1003 can be used to execute the steps executed by the communication module 901 described above.
  • the processor 1001 calls the program stored in the memory 1002 to execute the steps executed by the above processing module 902.
  • the transceiver 1003 may be used to receive a first message from the control node, and the first message is used to instruct to release the user plane connection.
  • the first control message includes a fifth instruction for instructing the first terminal device not to reply to the first message; the processor 1001 can be used to release the user plane connection.
  • the communication device 1100 shown in FIG. 11 may be used as the data processing node involved in the foregoing method embodiment, and perform the steps performed by the data processing node in the foregoing method embodiment.
  • the data processing node may include UPF and/or NEF.
  • the communication device 1100 may include a communication module 1101 and a processing module 1102, and the communication module 1101 and the processing module 1102 are mutually coupled.
  • the communication module 1101 may be used to support the communication device 1100 to communicate.
  • the communication module 1101 may have a wired communication function, such as being able to communicate with other network elements in a wired manner.
  • the processing module 1102 can be used to support the communication device 1100 to perform the processing actions in the above method embodiments, including but not limited to: generating information and messages sent by the communication module 1101, and/or demodulating the signals received by the communication module 1101 Decoding and so on.
  • the processing module 1102 can be used to determine that it is no longer in a congested state; the communication module 1101 can be used to send a third instruction to the control node, and the third instruction is used to indicate the The data processing node is in this congested state.
  • the above third indication may include the identification of the data processing node.
  • the above communication module 1101 may also be used to receive a fourth instruction from the control node, where the fourth instruction is used by the data processing node to instruct the data processing node that is not in the congested state to send the third instruction.
  • the communication device provided in the embodiment of the present application may also be composed of hardware components, such as a processor, a memory, or a communication interface.
  • the communication device 1200 may include a communication interface 1201, a memory 1202, and a processor 1203.
  • the communication interface 1201 can be used for the communication device 1200 to communicate, for example, for sending or receiving signals.
  • the communication interface 1201 can be used for the communication device 1200 to send and receive signals in a wired manner.
  • the communication interface 1201 can be used for the communication device 1200 and SMF, RAN or DN or other core networks or access networks. Yuan to communicate.
  • the communication interface 1201 may be used for the communication device 1200 to communicate with SMF, AMF, or other core network or access network network elements.
  • the memory 1202 can be coupled with the processor 1203, and can be used to store programs and data necessary for the communication device 1200 to implement various functions.
  • the processor 1203 is configured to support the communication device 1200 to perform corresponding processing functions in the foregoing method, such as generating information and messages sent by the communication interface 1201, and/or demodulating and decoding signals received by the communication interface 1201, and so on.
  • the above memory 1202 and processor 1203 may be integrated or independent of each other.
  • the above memory 1202 and/or the communication interface 1201 may also be externally connected to the communication device 1200. If the memory 1202 and the communication interface 1201 are both externally connected to the communication device 1200, the communication device 1200 may include the processor 1203 at this time.
  • the above communication module 1101 may have the structure shown in the communication interface 1201.
  • the above processing module 1102 may include a processor 1203, or a processor 1203 and a memory 1202.
  • the above communication device 1200 may also be composed of a chip.
  • the chip includes a processor 1203.
  • the chip may also include a memory 1202 and a communication interface 1201. Among them, the memory 1202, the communication interface 1201 and the processor 1203 can be coupled to each other.
  • the steps executed by the above processing module 1102 can be executed by the processor 1203, and the steps executed by the above communication module 1101 can be executed by the communication interface 1201.
  • the memory 1202 may be used to store a program for the processor 1203 to call the program to execute the steps performed by the processing module 1102 above.
  • the processor 1203 may be used to determine that it is no longer in a congested state; the communication interface 1201 may be used to send a third instruction to the control node, and the third instruction is used to indicate the The data processing node is in this congested state.
  • the above third indication may include the identification of the data processing node.
  • the above communication interface 1201 may also be used to receive a fourth instruction from the control node, where the fourth instruction is used by the data processing node to instruct the data processing node that is not in the congested state to send the third instruction.
  • each component in the above communication device may be integrated into a module, or may be a separate physical existence.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules, and should not be construed as limited to the structure shown in the above drawings.
  • the present application also provides a communication system, which may include the above control node and data processing node, or include the above control node, second terminal device, and data processing node.
  • the communication system can be used to implement the operations performed by the control node, the second terminal device, or the data processing node in the foregoing method embodiment and any one of the possible implementation manners of the method embodiment.
  • the communication system has a structure as shown in FIG. 4.
  • the communication system may include a control node and a data processing node.
  • the control node can be used to determine that the data processing node is in a congested state, and the data processing node is used to process data sent by the terminal device.
  • the control node may also send a first message to the first terminal device corresponding to the identification of the terminal device in the list stored by the control node, where the identification of the terminal device in the list is in an abnormal state received by the control node
  • the identifier of the first terminal device, the first message is used to instruct to release the user plane connection, and the user plane connection is used to transmit data of the first terminal device.
  • the data control node can be used to send a first instruction to the control node.
  • the control node may receive the first instruction from the data processing node.
  • the first indication may be used to indicate that the data control node is in a congested state.
  • the communication system may further include a first terminal device.
  • the first terminal device can be used to receive the first message from the control node and release the user plane connection according to the first message.
  • the data processing node may also send a third instruction to the control node.
  • the control node may receive the third instruction from the data processing node.
  • the third indication can be used to indicate that the data processing node is not in a congested state.
  • the third indication may be sent after the data processing node is no longer in a congested state.
  • the embodiment of the application also provides a computer-readable storage medium on which a computer program is stored.
  • the program When the program is executed by a processor, the computer executes the above method embodiment and method implementation.
  • the present application also provides a computer program product, which when invoked and executed by a computer, enables the computer to implement the above method embodiment and any possible implementation of the method embodiment The operation performed by the control node, the second terminal device, or the data processing node.
  • the present application also provides a chip or chip system, and the chip may include a processor.
  • the chip may also include a memory (or storage module) and/or a transceiver (or communication module), or the chip may be coupled with a memory (or storage module) and/or a transceiver (or communication module), wherein the transceiver ( (Or communication module) can be used to support the chip for wired and/or wireless communication, the memory (or storage module) can be used to store a program, and the processor can call the program to implement any one of the above method embodiments and method embodiments.
  • the chip system may include the above chips, and may also include the above chips and other discrete devices, such as a memory (or storage module) and/or a transceiver (or communication module).
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Train Traffic Observation, Control, And Security (AREA)
  • Selective Calling Equipment (AREA)
  • Control By Computers (AREA)

Abstract

本申请提供一种拥塞控制方法及装置,用以优化无线通信系统的拥塞控制方式。根据方法,控制节点可确定数据处理节点处于拥塞状态,数据处理节点用于处理终端装置发送的数据;控制节点可向控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,列表中的终端装置的标识为控制节点所接收的处于异常状态下的第一终端装置的标识,第一消息用于指示释放用户面连接,用户面连接用于传输第一终端装置的数据。该方法可避免拥塞控制对标识未包含在列表内的终端装置的影响。

Description

一种拥塞控制方法及装置
相关申请的交叉引用
本申请要求在2019年06月17日提交中国专利局、申请号为201910520532.0、申请名称为“一种拥塞控制方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及移动通信技术领域,尤其涉及一种拥塞控制方法及装置。
背景技术
第五代(5th generation,5G)无线通信技术,具有大容量和高速率的特点,这就要求5G无线通信系统具有较强的拥塞控制能力,以应对大容量和高速率传输中可能出现的节点拥塞。节点拥塞的原因之一,是节点处待处理的数据量过大,导致节点出现过载,例如,恶意终端(UE)发动分布式拒绝服务(distributed denial of service,DDoS)攻击,对某个服务器同时发起大量连接并传输大量的攻击流量,造成处理这些流量的节点出现拥塞。
目前,无线通信系统进行拥塞控制的主要方式是,节点在出现拥塞后拒绝来自UE的业务请求,例如,来自全部UE的不满足优先级要求的业务请求会被拒绝。这种拥塞控制方式可能会对大量UE的正常业务造成影响,有待改进。
发明内容
本申请提供一种拥塞控制方法及装置,用以优化无线通信系统的拥塞控制方式。
第一方面,本申请提供一种拥塞控制方法,该方法可由控制节点实施。根据该方法,控制节点可确定数据处理节点处于拥塞状态,所述数据处理节点用于处理终端装置发送的数据;所述控制节点可向所述控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,所述列表中的终端装置的标识为所述控制节点所接收的处于异常状态下的所述第一终端装置的标识,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据。
采用以上方法,控制节点可在数据处理节点出现拥塞后,根据存储的列表对列表中标识所属的终端装置进行拥塞控制,由于该列表包括处于异常状态下的终端装置的标识,因此在执行拥塞控制时,控制节点可释放处于异常状态下的终端装置的用户面连接,从而避免拥塞控制对标识未包含在列表内的终端装置的影响。
另外,由于AF/NWDAF检测出的处于异常状态的终端设备数据通常较大,不适合分布式存储,并且这些处于异常状态的终端设备也需要集中处理,因此引入独立的控制节点可以降低整个网络对于终端设备存储的开销,也便于集中处理异常终端设备。数据处理节点通过通知的方式可以通过使用较小的信令开销通知控制节点处理大量的异常状态的终端设备,这样降低了数据处理节点的存储开销和处理开销。
控制节点可接收第二终端装置的标识,所述第二终端装置为处于异常状态下的终端装 置。其中,所述第二终端标识包含在所述列表中。若第一时长内所述数据处理节点未处于所述拥塞状态,所述控制节点可从所述列表中删除所述第二终端装置的标识。从而控制节点可在第一时长内,对该第二终端装置进行控制,当超过第一时长后,该第二终端装置导致拥塞的可能性较低,因此不再控制该终端装置,以避免对该终端装置的正常业务产生影响。
以上每个第二终端装置满足以下条件中的任意一项或多项:第二终端装置的用户面数据的传输过程存在分布式拒绝服务DDoS攻击;或者,第二终端装置的用户面数据的目标地址错误;或者,第二终端装置的用户面数据的传输时长达到阈值时长的用户面数据;或者,第二终端装置的用户面数据的数据长度达到阈值长度的用户面数据;或者,第二终端装置的用户面数据的传输速率达到阈值速率的用户面数据。
若第二时长内所述数据处理节点未处于所述拥塞状态,所述控制节点可删除所述列表,或删除所述列表中的全部标识。从而控制节点可在第二时长内,对第二时长对应的列表中的终端装置进行控制,当超过第二时长后,该这些终端装置导致拥塞的可能性较低,因此不再控制这些终端装置,以避免对该终端装置的正常业务产生影响。
可选的,控制节点可根据接收的第一指示,确定数据处理节点处于拥塞状态。其中,第一指示可包括数据处理节点的标识。
在一种具体的示例中,第一指示可用于指示所述数据处理节点处于所述拥塞状态。
在接收该第一指示之前,控制节点可向所述数据处理节点发送第二指示,所述第二指示用于指示所述数据处理节点在处于所述拥塞状态时发送所述第一指示。
在另一种示例中,第一指示可用于指示数据控制节点的运行状态,例如,CPU使用率和/或数据丢包率等等。
在接收该第一指示之前,控制节点可向所述数据处理节点发送第二指示,所述第二指示可用于指示数据处理节点在满足发送第一指示的特定条件时发送该第一指示。示例性的,发送第一指示的特定条件可以是满足发送周期或发生特定事件,如,数据处理节点可根据第二指示,在CPU使用率达到(或超过)第二指示中包含的使用率阈值后,上报该CPU使用率,和/或,数据处理节点可根据第二指示,在数据丢包率(或称丢包率)达到(或超过)第二指示中包含的数据丢包率阈值后,上报该数据丢包率。
以上第一消息可包括所述用户面连接的标识。因此可通过第一消息指示第一终端装置释放第一消息所指示的用户面连接,避免拥塞控制对其他用户面连接的邮箱。
当所述控制节点包括SMF,且所述数据处理节点的数量为多个的情况下,控制节点可根据多个所述数据处理节点各自的上下文确定数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络,所述多个所述数据处理节点各自的上下文存储于所述控制节点,每个所述数据处理节点的上下文包括所述每个所述数据处理节点支持的数据网络的标识;以及,所述控制节点可根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
当所述控制节点包括AMF,且所述数据处理节点的数量为多个时,控制节点可从SMF接收数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络;以及,所述控制节点可根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一 终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
在一种可能的示例中,当所述控制节点包括SMF时,若控制节点确定所述数据处理节点处于所述拥塞状态,当接收来自所述第一终端装置的第一用户面连接建立请求时,控制节点可向所述第一终端装置发送所述拒绝响应,所述拒绝响应与所述第一用户面连接建立请求对应,所述拒绝响应用于指示所述第一终端装置在第三时长内不发送用户面连接建立请求。
进一步的,当控制节点确定所述数据处理节点未处于所述拥塞状态时,若所述控制节点还接收来自所述第一终端装置的第二用户面连接建立请求,则所述控制节点可向所述第一终端装置发送接受响应,所述接受响应对应所述第二用户面连接建立请求。从而当控制节点确定数据处理节点不再处于拥塞状态时,控制节点不再拒绝第一终端装置的用户面连接建立请求,避免影响该终端装置的正常业务。
在一种可能的示例中,当所述控制节点包括AMF时,若控制节点接收来自所述第一终端装置的第一信令连接建立请求,所述控制节点可向所述第一终端装置发送拒绝响应,所述拒绝响应与所述第一信令连接建立请求对应,所述拒绝响应用于指示所述异常终端装置在第四时长内不发送信令连接建立请求。
进一步的,当控制节点确定所述数据处理节点未处于所述拥塞状态时,若所述控制节点接收来自所述第一终端装置的第二信令连接建立请求,所述控制节点可向所述第一终端装置发送接受响应,所述接受响应对应所述第二信令连接建立请求。从而当控制节点确定数据处理节点不再处于拥塞状态时,控制节点不再拒绝第一终端装置的信令连接建立请求,避免影响该终端装置的正常业务。
示例性的,控制节点可接收第三指示,并根据第三指示,确定数据处理节点未处于所述拥塞状态。其中,第三指示可包括数据处理节点的标识。从而控制节点可及时获知数据节点不再处于拥塞状态,避免对第一终端装置业务的影响。
在一种可能的示例中,第三指示可用于指示所述数据处理节点未处于所述拥塞状态,此时,第三指示可以是数据处理节点在确定自身未处于拥塞状态后发送的。
在接收该第三指示之前,控制节点还可向数据处理节点发送第四指示,第四指示可用于指示数据处理节点在确定自身未处于拥塞状态后发送该第三指示。
在另一种可能的示例中,第三指示可用于指示数据处理节点的运行状态,如CPU使用率和/或数据丢包率,根据第三指示结合自身预配的策略判断数据处理节点是否未处于拥塞状态。
在接收该第三指示之前,控制节点还可向数据处理节点发送第四指示,第四指示可用于指示数据处理节点在满足发送第三指示的特定条件后发送该第三指示。其中,该特定条件可以是满足发送周期,如第四指示中包含的周期。或者,该特定条件可以是发生特定事件,如,数据处理节点可根据第四指示,在CPU使用率未达到(或小于)第四指示中包含的使用率阈值后,上报该CPU使用率,和/或,数据处理节点可根据第四指示,在数据丢包率未达到(或小于)第四指示中包含的数据丢包率阈值后,上报该数据丢包率。应理解,第四指示中包含的使用率阈值可与第二指示中包含的使用率阈值相同或不同。第四指示中包含的数据丢包率阈值可与第二指示中包含的数据丢包率阈值相同或不同。
在接收第三指示之前,控制节点还可向所述数据处理节点发送第四指示,所述第四指示用于指示所述数据处理节点在未处于所述拥塞状态时发送所述第三指示。
在一种可能的示例中,当所述控制节点包括AMF时,控制节点还可向所述第一终端装置发送第二消息,所述第二消息用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域不支持所述第一终端装置请求建立信令连接。从而AMF可通过修改第一终端装置的位置为不支持区域的方式,令第一终端装置不再发送信令连接建立请求,以降低对于数据处理节点的占用。
以上第一消息可包括第五指示,所述第五指示用于指示所述第一终端装置不回复所述第一消息。从而控制节点可令第一终端装置不发送第一消息的响应消息,以降低响应消息对于数据处理节点的占用。
以上控制节点,可包括SMF或AMF。
若控制节点为SMF,以上第一消息可承载于NAS SM信令。若控制节点为AMF,以上第一消息可承载于NAS信令。
第二方面,本申请提供一种拥塞控制方法,该方法可由第一终端装置实施。根据该方法,第一终端装置可从控制节点接收第一消息,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据,所述第一控制消息包括第五指示;所述第五指示用于指示所述第一终端装置不回复所述第一消息;所述第一终端装置可根据所述第一消息释放所述用户面连接。
第三方面,本申请提供一种拥塞控制方法,该方法可由数据处理节点实施。根据该方法,数据处理节点可确定自身不再处于拥塞状态,以及,向控制节点发送第三指示,所述第三指示用于指示所述数据处理节点未处于所述拥塞状态。
以上第三指示可包括所述数据处理节点的标识。
在发送以上第三指示之前,数据处理节点可从所述控制节点接收第四指示,所述第四指示用于指示所述数据处理节点未处于所述拥塞状态的所述数据处理节点发送所述第三指示。
第四方面,本申请提供一种通信装置,该通信装置可用于执行上述第一方面或第一方面的任一可能的设计中由控制节点执行的步骤。该通信装置可通过硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各方法中的各功能。
在通过硬件组件实现第四方面所示通信装置时,该通信装置可包括处理器。可由处理器执行以上第一方面中或第一方面的任一可能的设计中由控制节点所执行的步骤。该通信装置可包括收发器,收发器可用于支持以上装置与其他设备或装置进行通信。具体的,该收发器可用于支持通信装置进行通信。在通过硬件组件实现以上装置时,该装置还可包括存储器,该存储器可用于存储程序,可由处理器执行该程序以执行以上通信装置所执行的步骤。
在执行以上第一方面所示方法时,以上处理器可用于确定数据处理节点处于拥塞状态,所述数据处理节点用于处理终端装置发送的数据;以上收发器可用于向所述控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,所述列表中的终端装置的标识为所述控制节点所接收的处于异常状态下的所述第一终端装置的标识,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据。
收发器还可用于,接收第二终端装置的标识,所述第二终端装置为处于异常状态下的终端装置;所述第二终端标识包含在所述列表中;若第一时长内所述数据处理节点未处于所述拥塞状态,则处理器还用于:从所述列表中删除所述第二终端装置的标识。
若第二时长内所述数据处理节点未处于所述拥塞状态,则处理器还可用于删除所述列表;或者,删除所述列表中的全部标识。
以上收发器还可用于接收第一指示,所述第一指示用于指示所述数据处理节点处于所述拥塞状态;以上处理器可根据所述第一指示,确定所述数据处理节点处于拥塞状态。
以上收发器还可向数据处理节点发送第二指示,所述第二指示用于指示所述数据处理节点在处于所述拥塞状态时发送所述第一指示。
以上第一消息可包括所述用户面连接的标识。
当所述控制节点包括SMF,且所述数据处理节点的数量为多个时,以上处理器还可根据多个所述数据处理节点各自的上下文确定数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络,所述多个所述数据处理节点各自的上下文存储于所述控制节点,每个所述数据处理节点的上下文包括所述每个所述数据处理节点支持的数据网络的标识;以及,处理器可根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
当所述控制节点包括AMF,且所述数据处理节点的数量为多个时,以上收发器还可用于从SMF接收数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络;以上处理器还可用于根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
在确定数据处理节点处于拥塞状态后,当所述控制节点包括SMF时,以上收发器还可在接收来自所述第一终端装置的第一用户面连接建立请求后,向所述第一终端装置发送所述拒绝响应,所述拒绝响应与所述第一用户面连接建立请求对应,所述拒绝响应用于指示所述第一终端装置在第三时长内不发送用户面连接建立请求。
以上处理器还可用于确定所述数据处理节点未处于所述拥塞状态;则以上收发器还可在接收来自所述第一终端装置的第二用户面连接建立请求后,向所述第一终端装置发送接受响应,所述接受响应对应所述第二用户面连接建立请求。
在确定数据处理节点处于拥塞状态后,当所述控制节点包括AMF时,以上收发器还可在接收来自所述第一终端装置的第一信令连接建立请求后,向所述第一终端装置发送拒绝响应,所述拒绝响应与所述第一信令连接建立请求对应,所述拒绝响应用于指示所述异常终端装置在第四时长内不发送信令连接建立请求。
以上处理器还可用于确定所述数据处理节点未处于所述拥塞状态;所述收发器还可在接收来自所述第一终端装置的第二信令连接建立请求后,向所述第一终端装置发送接受响应,所述接受响应对应所述第二信令连接建立请求。
以上收发器还可用于接收第三指示,所述第三指示用于指示所述数据处理节点未处于所述拥塞状态;以上处理器可根据所述第三指示,确定所述数据处理节点未处于所述拥塞状态。
在接收第三指示之前,收发器还可向所述数据处理节点发送第四指示,所述第四指示用于指示所述数据处理节点在未处于所述拥塞状态时发送所述第三指示。
当所述控制节点包括AMF时,收发器还可用于向所述第一终端装置发送第二消息,所述第二消息可用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域 不支持所述第一终端装置请求建立信令连接。
以上第一消息可包括第五指示,所述第五指示用于指示所述第一终端装置不回复所述第一消息。
在由软件模块构成时,通信装置可包括相互耦合的通信模块以及处理模块,其中,通信模块可用于支持通信装置进行通信,处理模块可用于通信装置执行处理操作,如生成需要发送的信息/消息,或对接收的信号进行处理以得到信息/消息。具体的,通信模块可用于执行以上收发器所执行的步骤,和/或,处理模块可用于执行以上处理器所执行的步骤。
第五方面,本申请提供一种通信装置,该通信装置可用于执行上述第二方面或第二方面的任一可能的设计中由第一终端装置执行的步骤。该通信装置可通过硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各方法中的各功能。在通过硬件组件实现第五方面所示通信装置时,该通信装置可包括处理器。可由处理器执行以上第二方面或第二方面的任一可能的设计中由第一终端装置所执行的处理步骤。该通信装置可包括收发器,收发器可用于支持以上装置与其他设备或装置进行通信。在通过硬件组件实现以上装置时,该装置还可包括存储器,该存储器可用于存储程序,可由处理器执行该程序以执行以上第一终端装置所执行的处理步骤。
在执行以上第二方面所示方法时,收发器可用于从控制节点接收第一消息,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述终端装置的数据,所述第一控制消息包括第五指示,所述第五指示用于指示所述第一终端装置不回复所述第一消息;处理模块可用于根据第一消息释放所述用户面连接。
在由软件模块构成时,通信装置可包括相互耦合的通信模块以及处理模块,其中,通信模块可用于支持通信装置进行通信,处理模块可用于通信装置执行处理操作,如生成需要发送的信息/消息,或对接收的信号进行处理以得到信息/消息。具体的,通信模块可用于执行以上收发器所执行的步骤,和/或,处理模块可用于执行以上处理器所执行的步骤。
第六方面,本申请提供一种通信装置,该通信装置可用于执行上述第三方面或第三方面的任一可能的设计中由数据处理节点执行的步骤。该通信装置可通过硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各方法中的各功能。在通过硬件组件实现第流方面所示通信装置时,该通信装置可包括处理器。可由处理器执行以上第三方面或第三方面的任一可能的设计中由数据处理节点所执行的处理步骤。该通信装置可包括收发器,收发器可用于支持以上装置与其他设备或装置进行通信。在通过硬件组件实现以上装置时,该装置还可包括存储器,该存储器可用于存储程序,可由处理器执行该程序以执行以上数据处理节点所执行的处理步骤。
在执行以上第三方面所示方法时,处理模块可用于确定数据处理节点不再处于拥塞状态;通信模块可用于向控制节点发送第三指示,所述第三指示用于指示所述数据处理节点处于所述拥塞状态。其中,不再处于拥塞状态,是指数据处理节点以前处于但当前不再处于拥塞状态。
以上第三指示可包括所述数据处理节点的标识。
在发送以上第三指示之前,以上通信模块还可用于从所述控制节点接收第四指示,所述第四指示用于数据处理节点指示未处于所述拥塞状态的所述数据处理节点发送所述第三指示。
在由软件模块构成时,通信装置可包括相互耦合的通信模块以及处理模块,其中,通 信模块可用于支持通信装置进行通信,处理模块可用于通信装置执行处理操作,如生成需要发送的信息/消息,或对接收的信号进行处理以得到信息/消息。具体的,通信模块可用于执行以上收发器所执行的步骤,和/或,处理模块可用于执行以上处理器所执行的步骤。
第七方面,本申请提供一种通信系统,该通信系统可以包括第四方面所示的通信装置以及数据处理节点。
以第四方面所示的通信装置为控制节点为例,在实施本申请实施例提供的拥塞控制方法时,该控制节点可用于确定数据处理节点处于拥塞状态,该数据处理节点用于处理终端装置发送的数据。该控制节点还可向该控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,该列表中的终端装置的标识为该控制节点所接收的处于异常状态下的该第一终端装置的标识,该第一消息用于指示释放用户面连接,该用户面连接用于传输该第一终端装置的数据。
该数据控制节点可用于向控制节点发送第一指示。相应地,控制节点可从数据处理节点接收第一指示。该第一指示可用于指示数据控制节点处于拥塞状态。
可选地,该通信系统还可包括第五方面所示的通信装置。以第五方面所示的通信装置为以上第一终端装置为例,该第一终端装置可用于从控制节点接收第一消息,并根据第一消息释放用户面连接。
可选地,该通信系统还可包括第六方面所示的通信装置。以该第六方面所示的通信装置为以上数据处理节点为例,该数据处理节点还可向该控制节点发送第三指示。相应地,控制节点可从数据处理节点接收第三指示。该第三指示可用于指示数据处理节点未处于拥塞状态。第三指示可以是数据处理节点不再处于拥塞状态后发送的。
第八方面,本申请提供一种计算机存储介质,所述计算机存储介质中存储有指令(或称程序),当其在计算机上被调用执行时,使得计算机执行上述第一方面或第一方面的任意一种可能的设计、第二方面或第二方面的任意一种可能的设计或第三方面或第三方面的任意一种可能的设计中所述的方法。
第九方面,本申请提供一种计算机程序产品,该计算基础产品可包含指令,当所述计算机程序产品在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意一种可能的设计、第二方面或第二方面的任意一种可能的设计或第三方面或第三方面的任意一种可能的设计中所述的方法。
第十方面,本申请提供一种芯片或包含芯片的芯片系统,该芯片可包括处理器。该芯片还可以包括存储器(或存储模块)和/或收发器(或通信模块)。该芯片可用于执行上述第一方面或第一方面的任意一种可能的设计、第二方面或第二方面的任意一种可能的设计或第三方面或第三方面的任意一种可能的设计中所述的方法。该芯片系统可以由上述芯片构成,也可以包含上述芯片和其他分立器件,如存储器(或存储模块)和/或收发器(或通信模块)。
上述第二方面至第十方面及其可能的设计中的有益效果可以参考对第一方面及其任一可能的设计中所述方法的有益效果的描述。
附图说明
图1为本申请实施例提供的一种无线通信系统的架构示意图;
图2为本申请实施例提供的一种拥塞控制方法的流程示意图;
图3为本申请实施例提供的另一种拥塞控制方法的流程示意图;
图4为本申请实施例提供的另一种拥塞控制方法的流程示意图;
图5为本申请实施例提供的另一种拥塞控制方法的流程示意图;
图6为本申请实施例提供的另一种拥塞控制方法的流程示意图;
图7为本申请实施例提供的一种通信装置的结构示意图;
图8为本申请实施例提供的另一种通信装置的结构示意图;
图9为本申请实施例提供的另一种通信装置的结构示意图;
图10为本申请实施例提供的另一种通信装置的结构示意图;
图11为本申请实施例提供的另一种通信装置的结构示意图;
图12为本申请实施例提供的另一通信装置的结构示意图。
具体实施方式
为了使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请作进一步地详细描述。应理解,本申请方法实施例中的具体操作方法也可以应用于装置实施例或系统实施例中。
为便于理解本申请实施例的方案,先介绍本申请实施例可以应用的场景。
本申请实施例提供的拥塞控制方法可用于5G通信系统。以图1为例,5G网络架构中可包括三部分,分别是终端装置部分、数据网络(data network,DN)和运营商网络部分。
其中,运营商网络中的站点可包括但不限于:网络切片选择(network slice selection function,NSSF)、网络开放功能(network exposure function,NEF)网元、网络存储功能(network function repository function,NRF)网元、策略控制功能(policy control function,PCF)网元、统一数据管理(unified data management,UDM)网元、应用功能(application function,AF)网元、网络数据分析功能(network data analysis function,NWDAF)网元、鉴权服务器功能(authentication server function,AUSF)网元、接入与移动性管理功能(access and mobility management function,AMF)网元、会话管理功能(session management function,SMF)网元、(无线)接入网((radio)access network,(R)AN)以及用户面功能(user plane function,UPF)网元等。上述运营商网络中,除(无线)接入网部分之外的部分可以称为核心网络(CN)部分。为方便说明,后续以(R)AN称为接入网设备为例进行说明。
如图1所示的UE可以是一种具有无线收发功能的设备或装置,其可以部署在陆地上,包括室内或室外、手持或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。所述UE可以是手机(mobile phone)、平板电脑(pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、5G垂直行业中的移动机器人(mobile robot)、自动导引运输车(automated guided vehicle,AGV)、传感器、控制设备或者车辆(vehicle)和列车上的设备等无线终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。示例性的,UE可由芯片或芯片系统实现。UE也可以为终端装置。此外,本申请中的终端装置也可以为一种芯片或芯片系统。
上述UE可通过运营商网络提供的接口(例如N1等)与运营商网络建立连接,使用 运营商网络提供的数据和/或语音等服务。UE还可通过运营商网络访问DN,使用DN上部署的运营商业务,和/或第三方提供的业务。其中,上述第三方可为运营商网络和UE之外的服务方,可为UE提供他数据和/或语音等服务。其中,上述第三方的具体表现形式,具体可根据实际应用场景确定,在此不做限制。
接入网设备,是指为终端提供无线通信功能的设备。本申请所述接入网设备包括但不限于:5G中的下一代基站(g nodeB,gNB)、演进型节点B(evolved node B,eNB)、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、基站控制器(base station controller,BSC)、基站收发台(base transceiver station,BTS)、家庭基站(例如,home evolved nodeB,或home node B,HNB)、基带单元(baseBand unit,BBU)、传输点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)或移动交换中心等。
以上网络切片选择NSSF网元可用于实现网络切片的灵活选择。示例性的,网络切片选择网元可支持基于网络切片选择协助信息(network slice selection assistance information,NSSAI)、位置信息或切片负荷信息等多种信息的切片选择策略,基于切片选择策略可实现智能化的切片选择方案。其中,网络切片选择网元可存储由运营商配置的切片选择策略等信息。在5G中,网络切片选择网元可以是NSSF网元,在未来通信如6G(the 6th generation,6G)中,网络切片选择网元仍可以是NSSF网元,或有其它的名称,本申请不做限定。
以上所示接入与移动性管理功能AMF网元(或称AMF实体)是由运营商网络提供的控制面网元,AMF网元作为非接入层(non-access stratum,NAS)信令的终结点,负责终端装置的接入认证和移动性管理等功能。在5G中,接入与移动性管理功能网元可以是AMF网元,在未来通信如第六代中,接入与移动性管理功能网元仍可以是AMF网元,或有其它的名称,本申请不做限定。示例性的,AMF网元可由芯片或芯片系统实现。
以上所示会话管理SMF网元(或称SMF实体)是由运营商网络提供的控制面网元,负责管理终端装置的协议数据单元(protocol data unit,PDU)会话。PDU会话是一个用于传输PDU的通道,终端装置需要通过PDU会话与DN互相传送PDU。PDU会话由SMF网元负责建立、维护和删除等。SMF网元可包括会话管理(如会话建立、修改和释放,包含UPF和RAN之间的隧道维护)、UE的网际协议(internet protocol,IP)地址分配和UPF网元的选择等功能。在5G中,会话管理网元可以是SMF网元,在未来通信如6G中,会话管理网元仍可以是SMF网元,或有其它的名称,本申请不做限定。示例性的,SMF网元可由芯片或芯片系统实现。
以上所示用户面功能UPF网元(或称UPF实体)是由运营商提供的网关,是运营商网络与DN通信的网关。UPF网元可包括用户面移动性锚点、用户数据的转发和路由、包检测、用户面策略实施和服务质量(Quality of Service,QoS)处理等功能。在5G中,用户面功能网元可以是UPF网元,在未来通信如6G中,用户面功能网元仍可以是UPF网元,或有其它的名称,本申请不做限定。示例性的,UPF网元可由芯片或芯片系统实现。
DN,也可以称为分组数据网络(packet data network,PDN),是位于运营商网络之外的网络,运营商网络可以接入多个DN,DN上可部署多种业务,可为终端装置提供数据和/或语音等服务。例如,DN是某智能工厂的私有网络,智能工厂安装在车间的传感器可为终端装置,DN中部署了传感器的控制服务器,控制服务器可为传感器提供服务。传感器可与控制服务器通信,获取控制服务器的指令,根据指令将采集的传感器数据传送给控制 服务器等。又例如,DN是某公司的内部办公网络,该公司员工的手机或者电脑可为终端装置,员工的手机或者电脑可以访问公司内部办公网络上的信息、数据资源等。可通过DN的标识如数据网络名称(data network name,DNN)对DN进行标识。另外,DN的标识还可包括接入点名称(access point name,APN)。
以上的统一数据管理UDM网元(或称UDM实体)是由运营商提供的控制面网元,负责存储运营商网络中签约用户的用户永久标识符(subscriber permanent identifier,SUPI)、信任状(credential)、安全上下文(security context)、签约数据等信息。UDM网元所存储的这些信息可用于终端装置接入运营商网络的认证和授权。其中,上述运营商网络的签约用户具体可为使用运营商网络提供的业务的用户,例如使用中国电信的手机芯卡的用户,或者使用中国移动的手机芯卡的用户等。上述签约用户的SUPI可为该手机芯卡的号码等。上述签约用户的信任状、安全上下文可为该手机芯卡的加密密钥或者跟该手机芯卡加密相关的信息等存储的小文件,用于认证和/或授权。上述安全上下文可为存储在用户本地终端(例如手机)上的数据(cookie)或者令牌(token)等。上述签约用户的签约数据可为该手机芯卡的配套业务,例如该手机芯卡的流量套餐或者使用网络等。需要说明的是,永久标识符、信任状、安全上下文、认证数据(cookie)、以及令牌等同认证、授权相关的信息,在本申请文件中,为了描述方便起见不做区分、限制。如果不做特殊说明,本申请实施例将以用安全上下文为例进行来描述,但本申请实施例同样适用于其他表述方式的认证、和/或授权信息。在5G中,统一数据管理网元可以是UDM网元,在未来通信如6G中,统一数据管理元仍可以是UDM网元,或有其它的名称,本申请不做限定。
以上网络开放功能NEF网元(或称NEF实体)是由运营商提供控制面网元。网络开放功能网元以安全的方式对第三方开放运营商网络的对外接口。在SMF网元需要与第三方的网元通信时,网络开放功能网元可作为SMF网元与第三方的网元通信的中继。网络开放功能网元作为中继时,可作为签约用户的标识信息的翻译,以及第三方的网元的标识信息的翻译。比如,NEF将签约用户的SUPI从运营商网络发送到第三方时,可以将SUPI翻译成其对应的外部身份标识(identity,ID)。反之,网络开放功能网元将外部ID(第三方的网元ID)发送到运营商网络时,可将其翻译成SUPI。在5G中,网络开放功能网元可以是NEF网元,在未来通信如6G中,网络开放功能网元仍可以是NEF网元,或有其它的名称,本申请不做限定。示例性的,NEF网元可由芯片或芯片系统实现。
以上策略控制功能PCF网元是由运营商提供的控制面功能,用于向SMF网元提供PDU会话的策略。策略可以包括计费相关策略、QoS相关策略和授权相关策略等。在5G中,策略控制功能网元可以是PCF网元,在未来通信如6G中,策略控制功能网元仍可以是PCF网元,或有其它的名称,本申请不做限定。
以上网络存储功能NRF网元(或称NRF实体)可用于为每个网络功能发现其他网络功能提供的服务,然后提供发现的网元信息给请求方网元。网络存储功能网元也可维护(如存储、管理和更新)可用网元实例的特征和其支持的业务能力相关参数,如网元实例标识、网元类型、PLMN、网络分片的相关标识,如网络切片选择辅助信息(single network slice selection assistance information,S-NSSAI)或网络切片实例标识、网元的IP地址或者域名、网元的能力信息、支持的业务能力名字,等等。在5G中,网络存储功能网元可以是NRF,在未来通信如6G中,网络开放网元仍可以是NRF,或有其它的名称,本申请不做限定。
以上网络数据分析功能NWDAF网元(或称NWDAF实体),可用于提供大数据分析 服务,该实体可以从3GPP网络收集数据,并进行大数据分析,从而提供更佳的策略。目前,NWDAF网元可用于检测处于异常状态(或称存在异常行为)的UE,异常状态例如UE存在DDoS攻击行为、UE处于非期待的位置、UE产生非期待的高速率或大流量数据、UE在非期待时期苏醒或者UE访问错误的目标地址等。NWDAF网元可收集这些处于异常状态的UE的标识。NWDAF网元还可收集UE所处的异常状态的标识,其中,异常状态的标识例如用于指示UE存在分布式拒绝服务(distributed denial of service,DDoS)攻击行为的ID。NWDAF网元还可收集处于异常状态的UE及该异常状态的标识的对应关系。
以上应用功能AF网元(或称AF实体)可用于提供应用服务,这种应用服务可以是第三方提供的,也可以是运营商提供的。例如在本申请中,当这种应用服务是安全检测服务时,AF网元可包括防火墙或入侵检测系统等。示例性的,AF网元可用于检测处于异常状态的UE,并收集这些处于异常状态的UE的标识。AF网元还可收集UE所处的异常状态的标识。
可选地,本申请所述5G通信系统可包括安全检测功能(security detection function,SEDF)。安全检测功能可对UE流量进行分析,发现其中的恶意流量。基于安全检测功能,可收集处于异常状态的UE的标识以及和/或所处异常状态的标识。以上AF网元或NWDAF网元可用于实现该功能。为方便说明,本申请中可将UE替换为终端装置。以及,本申请可将AF网元和/或NWDAF网元收集的处于异常状态的UE,称为第一终端装置。
图1中Nnssf、Nnef、Nausf、Nnrf、Npcf、Mnwdaf、Nudm、Naf、Namf、Nsmf、N1、N2、N3、N4,以及N6为接口序列号。这些接口序列号的含义可参见3GPP标准协议中定义的含义,在此不做限制。
为方便说明,在以下实施例中可将AMF网元描述为AMF、可将SMF网元描述为SMF、可将UPF网元描述为UPF、可将NEF网元描述为NEF、可将AF网元描述为AF以及可将NWDAF网元描述为NWDAF。
根据如图1所示通信系统,UE的用户面数据传输路径可包括路径一:UE-RAN-UPF-DN。UE的用户面数据传输路径还可包括路径二:UE-RAN-NEF-AF。其中,UPF和/或NEF在本申请中可被称为数据处理节点,可用于处理UE发送的数据。以DDoS攻击为例说明拥塞状态出现的原因:当大量UE被攻击者控制发起大量访问DN/AF的DDoS攻击时,大量的UE的用户面数据将聚合至UPF和/或NEF,因此在UPF和/或NEF可能产生拥塞。
下面结合图1所示通信系统,介绍本申请提供的拥塞控制方法。该控制方法可由控制节点执行,该方法可用于在数据处理节点处于拥塞状态时,降低数据对于数据处理节点的占用。应理解,本申请所述控制节点,可包括如图1所示SMF或AMF。本申请所述数据处理节点,可包括UPF、NEF、AMF和/或SMF等。
如图2所示,本申请提供一种拥塞控制方法,该方法可包括以下步骤:
S101:控制节点确定数据处理节点处于拥塞状态。其中,数据处理节点用于处理终端装置发送的数据。
示例性的,控制节点可从AF和/或NWDAF接收第一终端装置的标识。
其中,数据处理节点可包括AMF、SMF、UPF或者NEF中的至少一个。
S102:控制节点向该控制节点所存储的列表(或称黑名单)中的终端装置的标识所对应的第一终端装置发送第一消息,该列表中的终端装置的标识为该控制节点所接收的处于异常状态下的该第一终端装置的标识,该第一消息用于指示释放用户面连接,该用户面连 接用于传输该第一终端装置的数据。
其中,本申请所述的第一终端装置是指控制节点存储的列表中的终端装置的标识对应的终端装置。
相应地,第一终端装置接收第一消息。
S103:第一终端装置根据第一消息,释放用户面连接。
采用以上拥塞控制方法,控制节点可在数据处理节点处于拥塞状态后,释放第一终端装置的用户面连接,从而降低第一终端装置发送的数据对于数据处理节点的占用,减轻数据处理节点的拥塞,同时避免拥塞控制对于标识未包含在列表内的终端装置的影响。
在以上流程的实施中,控制节点可从AF网元和/或NWDAF网元接收第二终端装置的标识,其中,本申请所述的第二终端装置为处于异常状态下的终端装置。其中,第二终端装置的标识的数量可以是一个或多个。
其中,每个第二终端装置满足以下条件中的任意一项或多项:第二终端装置的用户面数据的传输过程存在分布式拒绝服务DDoS攻击;或者,第二终端装置的用户面数据的目标地址错误;或者,第二终端装置的用户面数据的传输时长达到阈值时长的用户面数据;或者,第二终端装置的用户面数据的数据长度达到阈值长度的用户面数据;或者,第二终端装置的用户面数据的传输速率达到阈值速率的用户面数据。
示例性的,控制节点可向AF网元和/或NWDAF网元订阅处于异常状态的终端装置的标识,例如,控制节点可向AF网元和/或NWDAF网元发送订阅请求,用于请求AF网元和/或NWDAF网元在检测到处于异常状态的终端装置后,将处于异常状态的终端装置(即第二终端装置)的标识发送至控制节点。应理解,本申请对于AF网元和/或NWDAF网元检测处于异常状态的终端装置的方式不予限制。
另外应理解,在S101之后,控制节点可以在每次接收到第二终端装置的标识后,执行S102的步骤,或者,控制节点可以在所述列表中的第一终端装置的标识的数量达到(或超过)某个阈值后,执行S102的步骤,本申请不予限制。
控制节点可根据接收的第二终端装置的标识,存储所述列表。
在一种具体的示例中,控制节点可接收第二终端装置的标识以及第二终端装置所处异常状态的标识,当该异常状态的标识指示第二终端装置存在DDoS攻击行为和/或UE产生非期待的高速率或大流量数据时,控制节点可将第二终端装置的标识存储至列表。否则,当第二终端装置处于存在DDoS攻击以外的异常状态时,控制节点不将第二终端装置的标识存储至列表。从而,控制节点在执行针对列表中的终端装置的控制拥塞控制时,优先释放存在DDoS攻击的终端装置的用户面连接,进一步提高拥塞控制精度,避免拥塞控制对不存在DDoS估计的终端装置的影响。
其中,第二终端装置的标识可以是一个终端装置的标识也可以是一组终端装置的标识。例如,第二终端装置的标识可以是一个或一组用户永久身份(subscription permanent identifier,SUPI)、一般公共订阅标识符(generic public subscription identifier,GPSI)、内部组标识、跟踪区域码(tracking area code,TAC)等。
异常状态的标识用于指示终端所处的异常,可以用于指示UE存在的分布式拒绝服务(distributed denial of service,DDoS)攻击行为、UE处于非期待的位置、UE产生非期待的高速率或大流量数据、UE在非期待时期苏醒或UE访问错误的目标地址等中的一个或多个异常状态。
在实施中,控制节点可根据第二终端装置的标识生成列表。因此,该列表中的标识可用于标识处于异常状态下的终端装置。应理解,控制节点可存储一个或多个列表,每个列表中可包括至少一个标识。在本申请中,可将列表中包含的标识所述的终端装置称为第一终端装置,也就是说,当控制节点存储有一个列表时,该列表中的标识所归属的终端装置可被称为第一终端装置,当控制节点存储有多个列表时,该多个列表分别包括的标识所归属的终端装置均可被称为第一终端装置。
在另一种实现方式可以中,控制节点可在第二终端装置的上下文中记录该第二终端装置对应的异常指示,比如,异常指示可以是该第二终端装置的异常状态、异常状态的标识或异常状态的标识对应的一个指示信息等等,从而可将第二终端装置与异常状态对应起来。其中,控制节点可根据第二终端装置的标识找到所标识的第二终端装置的上下文,并在上下文中记录异常指示。异常指示根据异常状态的标识获得,可以是一个二进制位,其中,1代表异常,0代表正常,例如,当异常状态的标识指示第二终端装置存在DDoS攻击行为和/或UE产生非期待的高速率或大流量数据时,异常指示记录为1。或者,控制节点直接在上下文中记录异常状态,如存储异常状态的标识。控制节点在逻辑上可以根据所有第二终端装置的上下文中获取存储有对应的异常状态的上下文,以获得列表,列表中的标识所归属的终端装置可被称为第一终端装置。
在一种可能的示例中,在接收第二终端装置的标识后,若在第一时长内数据处理节点未处于所述拥塞状态,则控制节点可从列表中删除该第二终端装置的标识。其中,不同的终端装置的标识可分别对应相同或不同的第一时长。
举例来说,列表中的终端装置的标识与第一时长的对应关系可以如表1所示。控制节点可根据表1执行第一时长的计时,并在第一时长的计时超时后,从列表中删除计时超时的第一时长所对应的标识。应理解,表1中所示对应关系仅仅是举例说明。控制节点可通过随机方式确定每个终端装置的标识对应的第一时长,或者,可通过协议或预配置的方式确定每个终端装置的标识对应的第一时长。示例性的,对于较多次接收到的第二终端装置的标识,控制节点可设置较长时间的第一时长。如表1所示,若控制节点第一次接收到UE 1的标识“ID_UE 1”,控制节点可设置较短的第一时长与标识“ID_UE 1”对应;又如,若控制节点较多次(例如,达到或超过次数阈值)从NWDAF接收到终端装置UE 2的标识“ID_UE 2”,即该终端装置导致数据处理节点拥塞的可能性更高,控制节点可设置较长的第一时长与终端装置的标识“ID_UE 2”对应。
Figure PCTCN2020096617-appb-000001
表1
示例性的,控制节点可以自将标识存储至该列表起,执行该终端装置的标识对应的第一时长的计时。例如,当控制节点从NWDAF网元接收到UE 3的标识“ID_UE 3”以及用于指示UE 3存在DDoS攻击和/或产生非期待的高速率或大流量数据的ID后,控制节点将标识“ID_UE 3”存储至列表,并启动定时器执行1分钟的计时,当1分钟的计时超时 前,若数据处理节点未处于拥塞状态,则控制节点可从该列表中删除标识“ID_UE 3”。
在另一种可能的示例中,每个列表可对应一个第二时长,若该第二时长内数据处理节点未处于所述拥塞状态,则控制节点删除该第二时长对应的列表,或者,控制节点删除第二时长对应的列表中的全部终端装置的标识。其中,不同的列表分别对应的第二时长可以相同或不同。
举例来说,列表与第二时长的对应关系可以如表2所示。控制节点可根据表2执行第二时长的计时,并在第二时长的计时超时后,删除该第二时长对应的列表,或者删除第二时长对应的列表中的全部终端装置的标识。应理解,表2中所示对应关系仅仅是举例说明。控制节点可通过随机方式确定每个列表对应的第二时长,或者,可通过协议或预配置的方式确定每个列表对应的第二时长。示例性的,控制节点可将较多次接收到的第二终端装置的标识存储至一个列表,并设置较长时间的第二时长与该列表对应。
如表2所示,若控制节点第一次接收到UE 1的标识“ID_UE 4”,控制节点可将标识“ID_UE 4”存储至列表1,并设置较短的第二时长与表1对应;又如,控制节点较多次(例如,达到或超过次数阈值)从NWDAF接收到终端装置UE 2的标识“ID_UE 5”,即该终端装置导致数据处理节点拥塞的可能性更高,控制节点可将标识“ID_UE 5”存储至列表2,并设置较长的第二时长与列表2对应。
Figure PCTCN2020096617-appb-000002
表2
示例性的,控制节点可以自列表中存储新的标识起,执行该列表对应的第二时长的计时。例如,当控制节点从NWDAF网元接收到UE 4的标识“ID_UE 4”后,控制节点将标识“ID_UE 4”存储至列表1,并启动定时器执行1分钟的计时,当1分钟的计时超时前,若数据处理节点未处于拥塞状态,则控制节点可删除列表1,或删除列表1中的全部标识,所述全部标识包括“ID_UE 4”。
可选的,控制节点可在每次存储新的终端装置的标识存储至某个列表起,重新执行该列表对应的第二时长的计时。例如,当上例中控制节点将标识“ID_UE 4”存储至列表1,并启动定时器执行1分钟的计时后,若在计时超时前控制节点将从NWDAF网元接收到UE 6的标识“ID_UE 6”,控制节点可将标识“ID_UE 6”存储至列表1并控制该定时器重新执行1分钟的计时。
在S101的实施中,控制节点可根据接收到的第一指示,确定数据处理节点处于拥塞状态。示例性的,第一指示可包括处于拥塞状态的数据处理节点的标识。
在一种具体的示例中,第一指示可用于指示数据处理节点处于拥塞状态,控制节点在接收到第一指示后,可以直接确定数据处理节点处于拥塞状态。
在另外一种实例中,第一指示可用于指示数据处理节点的运行状态,例如中央处理器(central processing unit,CPU)使用率、数据丢包率阈值等,控制节点在接收到第一指示 后,根据第一指示结合自身预配的策略判断数据处理节点是否处于拥塞状态。其中,控制节点预配的策略可包括运行状态阈值,如CPU使用率阈值和/或数据丢包率阈值等等。
在一种具体的示例中,当控制节点包括SMF时,UPF和/或NEF可在处于拥塞状态后,向控制节点发送第一指示。发送第一指示的UPF和/或NEF还可在第一指示中携带自身的标识。
可选的,在接收第一指示之前,控制节点还可向数据处理节点发送第二指示。
可选的,第二指示可用于指示在数据处理节点处于拥塞状态时发送以上第一指示。可选的,该第一指示用于指示数据处理节点处于拥塞状态。
或者,第二指示可用于指示数据处理节点在满足发送第一指示的特定条件的情况下,向控制节点发送第一指示。可选的,第一指示可用于指示数据处理节点的运行状态。其中,该特定条件可以是特定周期如第二指示中包含的周期。或者,该特定条件可以是发生特定事件,如,数据处理节点可根据第二指示,在CPU使用率达到(或超过)第二指示中包含的使用率阈值后,发送用于指示该CPU使用率的第一指示,和/或,数据处理节点可根据第二指示,在数据丢包率达到(或超过)第二指示中包含的数据丢包率阈值后,发送用于指示该数据丢包率的第一指示。
以控制节点为SMF且数据控制节点为UPF为例,控制节点可在与数据处理节点建立N4连接时,向数据处理节点发送该第二指示。当数据处理节点确定自身处于拥塞状态时,数据处理节点根据第二指示向控制节点发送第一指示。或者,当数据处理节点在满足特定条件的情况下,可根据第二指示向控制节点发送用于运行状态的第一指示。
以控制节点为SMF且数据控制节点为NEF为例,控制节点可在与数据处理节点NEF建立SMF-NEF连接时,向数据处理节点发送第二指示。例如,控制节点SMF在SM上下文创建请求(Nnef_SMContext_Create Request)消息中携带第二指示。当数据处理节点处于拥塞状态时,数据处理节点根据第二指示向控制节点发送第一指示。或者,当数据处理节点在满足发送第一指示的特定条件的情况下,可根据第二指示向控制节点发送用于运行状态的第一指示。
在另一种具体的示例中,当控制节点包括AMF时,NEF可向AMF发送第一指示。其中,NEF可在确定自身处于拥塞状态后,发送用于指示数据处理节点处于拥塞状态的第一指示。此前,SMF可向NEF发送第二指示,从而令NEF在处于拥塞状态后向控制节点AMF发送第一指示。或者,NEF可在满足发送第一指示的特定条件的情况下,向控制节点发送用于运行状态的第一指示。此前,SMF可向NEF发送第二指示,令NEF在满足发送第一指示的特定条件的情况下发送该第一指示。可选的,该示例中的第二指示可以是AMF发送至SMF的,或者是由AMF指示SMF发送的,或者,第二指示可以是SMF根据本地配置发送的。该第二指示可包括控制节点AMF的标识。示例性的,SMF可在与数据处理节点NEF建立SMF-NEF连接时,向NEF发送第二指示。
在另一种具体的示例中,当控制节点包括AMF时,UPF和/或NEF可向SMF发送第一指示,并由SMF将第一指示发送至控制节点AMF。其中,UPF和/或NEF可在确定自身处于拥塞状态后,发送用于指示自身处于拥塞状态的第一指示。此前,可由SMF向UPF和/或NEF发送第二指示,从而令UPF和/或NEF在处于拥塞状态后向控制节点AMF发送第一指示。或者,UPF和/或NEF可在满足发送第一指示的特定条件的情况下向控制节点AMF发送用于运行状态的第一指示。此前,SMF可向UPF和/或NEF发送第二指示,令 UPF和/或NEF在满足发送第一指示的特定条件的情况下发送该第一指示。可选的,该示例中的第二指示可以是AMF发送至SMF的,或者是由AMF指示SMF发送的,或者,第二指示可以是SMF根据本地配置发送的。该第二指示可包括控制节点AMF的标识。示例性的,SMF可在与UPF建立N4连接时,向数据处理节点发送该第二指示。
在本申请实施中,控制节点还可根据接收到的第三指示,确定数据处理节点未处于拥塞状态。示例性的,第三指示可包括数据处理节点的标识。
在一种具体的示例中,第三指示可用于指示数据处理节点未处于拥塞状态。该第三指示可以是数据处理节点确定自身不再处于拥塞状态后发送的。例如,数据处理节点长时间处于拥塞状态,但并未从拥塞状态进入非拥塞状态,则数据处理节点可不发送第三指示。
在另一种示例中,第三指示可用于指示数据处理节点的运行状态,例如CPU使用率、数据丢包率等,控制节点在接收到第三指示后,根据第三指示结合自身预配的策略判断数据处理节点是否未处于拥塞状态。
第三指示的发送方式,可参照以上第一指示的发送方式,在此不再赘述。
示例性的,在接收第三指示之前,控制节点还可向数据处理节点发送第四指示。
其中,第四指示可用于指示数据处理节点在未处于拥塞状态时发送以上第三指示。可选的,该第三指示可用于指示数据处理节点未处于拥塞状态。
或者,第四指示可用于指示数据处理节点在满足发送第三指示的特定条件时,发送以上第三指示。可选的,该第三指示可用于指示数据处理节点的运行状态。其中,该特定条件可以是特定周期,如第四指示中包含的周期。或者,该特定条件可以是发生特定事件,如,数据处理节点可根据第四指示,在CPU使用率未达到(或小于)第四指示中包含的使用率阈值后,上报该CPU使用率,和/或,数据处理节点可根据第四指示,在数据丢包率未达到(或小于)第四指示中包含的数据丢包率阈值后,上报该数据丢包率。应理解,第四指示中包含的使用率阈值可与第二指示中包含的使用率阈值相同或不同。第四指示中包含的数据丢包率阈值可与第二指示中包含的数据丢包率阈值相同或不同。
第四指示的发送方式,可参照以上第二指示的发送方式,在此不再赘述。
示例性的,数据处理节点可根据自身处理器的使用率和/或丢包率,确定是否处于拥塞状态。具体来说,当数据处理节点自身的CPU使用率达到(或超过)第一使用率阈值(例如90%)时,数据处理节点确定自身处于拥塞状态。另外,当数据处理节点转发终端装置发送的数据时的丢包率达到(或超过)第一丢包率阈值(例如10%)时,数据处理节点可确定自身处于拥塞状态。
其中,第一使用率阈值和/或第一丢包率阈值可以通过协议或者预配置的方式定义。另外,第一使用率阈值和/或第一丢包率阈值也可由控制节点指示,例如,可在第二指示中携带该第一使用率阈值和/或第一丢包率阈值。
可选的,第一使用率阈值可与第二指示对应的CPU使用率阈值相同或不同。第一丢包率阈值可与第二指示对应的数据丢包率阈值相同或不同。
另外,数据处理节点自身的CPU的使用率小于(或不超过)第二使用率阈值时,数据处理节点确定自身未处于拥塞状态。另外,当数据处理节点转发终端装置发送的数据时的丢包率小于(或不超过)第二丢包率阈值时,数据处理节点可确定自身未处于拥塞状态。在确定自身未处于拥塞状态后,数据处理节点可向控制节点发送第三指示,该第三指示用于指示数据处理节点未处于拥塞状态。第三指示可包括该数据处理节点的标识。
其中,第二使用率阈值和/或第二丢包率阈值可以通过协议或者预配置的方式定义。另外,第二使用率阈值和/或第二丢包率阈值也可由控制节点指示,例如,可在以上第四指示中携带该第二使用率阈值和/或第二丢包率阈值。应理解,以上第一使用率阈值可与第二使用率阈值相同或不同。以上第一丢包率阈值可与第二丢包率阈值相同或不同。
可选的,第二使用率阈值可与第四指示对应的CPU使用率阈值相同或不同。第二丢包率阈值可与第四指示对应的数据丢包率阈值相同或不同。
由于AF/NWDAF检测出的处于异常状态的第一终端设备数据通常较大,不适合分布式存储,并且这些处于异常状态的终端设备也需要集中处理,因此引入独立的控制节点可以降低整个网络对于终端设备存储的开销,也便于集中处理异常终端设备。数据处理节点通过通知的方式可以通过使用较小的信令开销通知控制节点处理大量的异常状态的终端设备,这样降低了数据处理节点的存储开销和处理开销。
在S102中,若第一终端装置的数量为多个,控制节点可向多个第一终端装置分别发送第一消息。
在一种具体的示例中,第一消息可包括用户面连接的标识,此时第一消息可用于指示第一终端装置释放标识所属的用户面连接。第一终端装置可根据第一消息,释放标识所属的用户面连接。
示例性的,若处于拥塞状态的数据处理节点的数量为多个,控制节点可根据多个数据处理节点中的至少两个数据处理节点均支持的数据网络的标识(如DNN),确定第一终端装置的用户面连接中,接入该数据网络的一个或多个用户面连接,并将该一个或多个用户面连接的标识携带在第一消息中,以指示第一终端装置释放该一个或多个用户面连接。
其中,数据处理节点支持的数据网络的标识,是指该数据处理节点支持建立连接至该标识所属数据网络的用户面连接。数据处理节点支持的数据网络的标识,可包含在该数据处理节点的上下文中。数据处理节点的上下文可存储于该数据处理节点连接的SMF。
下面,以控制节点包括SMF或AMF为例具体说明。
若控制节点包括SMF,则控制节点可根据自身存储的多个数据处理节点分别的上下文,确定多个数据处理节点分别支持的数据网络的标识,并将数据网络的标识中的至少两个数据处理节点共同支持的数据网络的标识,作为多个数据处理节点中的至少两个数据处理节点均支持的数据网络的标识。
举例来说,若SMF为控制节点,SMF存储有UPF_1、UPF_2以及UPF_3等UPF的上下文,当处于拥塞状态的数据处理节点包括UPF_1、UPF_2以及UPF_3时,SMF可根据UPF_1、UPF_2以及UPF_3各自的上下文,确定数据处理节点的标识与数据处理节点支持的DNN之间的对应关系,例如表3所示。
数据处理节点的标识 数据处理节点支持的DNN
ID_UPF_1 DNN_1、DNN_2
ID_UPF_2 DNN_3
ID_UPF_3 DNN_1、DNN_3
表3
SMF可根据表3确定UPF_1、UPF_2以及UPF_3中至少两个数据处理节点支持的数据网络的标识为DNN_1以及DNN_3。
进一步的,SMF可查询第一终端装置的上下文,以获取第一终端装置的全部用户面连 接。SMF可将第一终端装置的全部用户面连接中,用于接入DNN_1以及DNN_3的用户面连接携带在第一消息中。第一终端装置的上下文可存储于SMF。
若控制节点包括AMF,则AMF可从SMF接收多个数据处理节点分别支持的数据网络的标识,并将数据网络的标识中的至少两个数据处理节点共同支持的数据网络的标识,作为多个数据处理节点中的至少两个数据处理节点均支持的数据网络的标识。
其中,SMF可从多个处于拥塞状态的数据处理节点分别接收拥塞指示,其中拥塞指示可用于指示数据处理节点处于拥塞状态。拥塞指示可包括本申请所述第一指示。SMF可根据自身存储的该多个数据处理节点分别的上下文,确定多个数据处理节点分别支持的数据网络的标识,并将数据网络的标识中的至少两个数据处理节点共同支持的数据网络的标识,作为多个数据处理节点中的至少两个数据处理节点均支持的数据网络的标识。示例性的,SMF可将至少两个数据处理节点均支持的数据网络的标识,携带在第一指示中发送至AMF。或者,SMF可通过不同的消息分别向AMF发送第一指示以及至少两个数据处理节点均支持的数据网络的标识。
仍以表3为例,当SMF接收分别来自于UPF_1、UPF_2以及UPF_3的拥塞指示时,SMF可基于表3对应关系确定UPF_1、UPF_2以及UPF_3中至少两个数据处理节点支持的数据网络的标识为DNN_1以及DNN_3。之后SMF可将DNN_1以及DNN_3携带在第一指示中发送至AMF。其中,第一指示还可包括UPF_1、UPF_2以及UPF_3的标识,以指示UPF_1、UPF_2以及UPF_3处于拥塞状态。
进一步的,AMF可查询第一终端装置的上下文,以获取第一终端装置的全部用户面连接。AMF可将第一终端装置的全部用户面连接中,用于接入DNN_1以及DNN_3的用户面连接携带在第一消息中。第一终端装置的上下文可存储于AMF。
在另一种具体的示例中,第一消息可用于指示第一终端装置释放全部用户面连接。例如,当第一消息中不包含用户面连接的标识时,第一消息可用于指示第一终端装置释放全部的用户面连接。
在S102的实施中,第一消息可携带指示信息(在本申请中可被称为第五指示),第五指示可用于指示第一终端装置不发送该第一消息对应的响应消息,以降低第一消息对应的响应消息对于数据处理节点的作用。
应理解,以上用户面连接可以是PDU会话,以上第一消息可以是PDU会话释放消息。
若控制节点为SMF,以上第一消息可承载于NAS会话管理(session management,SM)消息。
若控制节点为AMF,以上第一消息可承载于NAS消息。
在本申请的实施中,S101之后,若控制节点包括SMF,控制节点可在接收到来自第一终端装置的第一用户面连接建立请求后,向第一终端装置发送第一用户面连接建立请求对应的拒绝响应,以表示拒绝根据该用户面连接建立请求建立第一终端装置的用户面连接。从而,SMF在数据处理节点处于拥塞状态后,禁止第一终端装置建立新的用户面连接,以减轻第一终端装置对于数据处理节点的占用。
具体的,该拒绝响应还可用于指示第一终端装置在第三时长内不发送用户面连接建立请求。其中,拒绝响应可包括第三时长,或包括用于指示第三时长的信息。另外,第三时长也可通过协议或预配置的方式确定。
进一步的,当控制节点在接收到第三指示后,即控制节点确定数据处理节点未处于拥 塞状态后,控制节点不再限制第一终端装置建立新的用户面连接。具体来说,在接收到第三指示后,若接收到来自第一终端装置的第二用户面连接建立请求,控制节点可向第一终端装置发送第二用户面连接建立请求对应的接受响应,以表示接受根据第二用户面连接建立请求建立第一终端装置的用户面连接。
示例性的,以上拒绝响应可携带指示信息,用于指示第一终端装置不发送该拒绝响应对应的响应消息,以降低该拒绝响应对应的响应消息对于数据处理节点的作用。
以上拒绝响应可承载于NAS SM消息。
另外,S101之后,若控制节点包括AMF,控制节点可在接收到来自第一终端装置的第一信令连接建立请求后,向第一终端装置发送第一信令连接建立请求对应的拒绝响应,以表示拒绝根据该信令连接建立请求建立第一终端装置的信令连接。从而,SMF在数据处理节点处于拥塞状态后,禁止第一终端装置建立新的信令连接,以减轻第一终端装置对于数据处理节点的占用。
具体的,该拒绝响应还可用于指示第一终端装置在第四时长内不发送信令连接建立请求。其中,拒绝响应可包括第四时长,或包括用于指示第四时长的信息。另外,第四时长也可通过协议或预配置的方式确定。
进一步的,当控制节点在接收到第三指示后,即控制节点确定数据处理节点未处于拥塞状态后,控制节点不再限制第一终端装置建立新的信令连接。具体来说,在接收到第三指示后,若接收到来自第一终端装置的第二信令连接建立请求,控制节点可向第一终端装置发送第二信令连接建立请求对应的接受响应,以表示接受根据第二信令连接建立请求建立第一终端装置的信令连接。
示例性的,以上拒绝响应可携带指示信息,用于指示第一终端装置不发送该拒绝响应对应的响应消息,以降低该拒绝响应对应的响应消息对于数据处理节点的作用。
以上拒绝响应可承载于NAS消息。
在本申请的实施中,S101之后,若控制节点包括AMF,控制节点还可向第一终端装置发送第二消息,第二消息可用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域不支持所述第一终端装置请求建立信令连接。从而,AMF可通过第二消息另第一终端装置进行配置,以指示第一终端装置不再请求建立新的信令连接,以降低建立新的信令连接的过程对于数据处理节点的作用。
示例性的,以上第二消息可包括UE配置更新消息,用于指示第一终端装置更新移动性限制列表(mobility restriction)。AMF可通过第二消息将移动性限制列表中的第一终端装置当前所处位置设置为不允许区域(non-allowed area),第一终端装置根据移动性限制列表更新配置,可将第一终端装置的位置设置为不支持区域。
示例性的,以上第二消息可携带指示信息,用于指示第一终端装置不发送该第二消息对应的响应消息,以降低该第二消息对应的响应消息对于数据处理节点的作用。
以上第二消息可承载于NAS消息。
在本申请的实施中,S101之后,若控制节点包括SMF,控制节点还可向第一终端装置发送第三消息,第三消息可用于指示将第一终端装置的用户面连接对应的QoS等级设置为第一QoS等级,其中,第一QoS等级低于该用户面连接当前的QoS等级。从而,可通过降低第一终端装置的服务质量的方式,降低第一终端装置对于数据处理节点的占用。
其中,第一QoS等级可以是一个预设的QoS等级,例如,第一QoS等级是表征最低 QoS的QoS等级。第一QoS等级也可以是根据用户面连接当前的QoS等级确定的QoS等级,比如,第一QoS等级是比用户面连接当前的QoS等级低N级的QoS等级,N为正整数。另外,第二消息可携带用于指示第一QoS等级的信息,如携带第一QoS等级的标识,以指示该第一QoS等级。
在一种具体的实现方式中,第三消息可携带用户面连接的标识,用于指示异常终端装置将该标识所属的用户面连接的QoS等级设置为第一QoS等级。SMF确定用户面连接的标识的方式可参照前述SMF确定第一消息中的用户面连接时的介绍。
在另外的实现方式中,第三消息可用于指示第一终端装置将其全部的用户面连接的QoS等级设置为第一QoS等级。例如,当,第三消息中不包含用户面连接的标识时,第三消息可用于指示第一终端装置将全部的用户面连接的QoS等级均设置为第一QoS等级。
示例性的,第三消息可携带策略与计费控制(Policy and Charging Control,PCC)规则,该PCC规则用于指示异常终端装置降低用户面连接的QoS等级。此外,SMF还可将该PCC规则发送至数据处理节点,用于数据处理节点根据PCC规则降低对应的用户面连接的QoS等级,并根据降低的QoS等级对异常终端装置提供业务服务。
示例性的,以上第三消息可携带指示信息,用于指示第一终端装置不发送该第三消息对应的响应消息,以降低该第三消息对应的响应消息对于数据处理节点的作用。
应理解,以上用户面连接可以是PDU会话,以上第三消息可以是PDU会话修改消息。
以上第三消息可承载于NAS SM消息。
另外,若控制节点与数据节点为相同的节点,例如,均为SMF,SMF在确定自身属于拥塞状态后,可执行S102所示步骤,向第一终端装置发送第一消息,其中,第一消息可包含以上实施例中介绍的S102中由SMF发送的内容。若控制节点与数据节点均为AMF,AMF在根据确定自身属于拥塞状态后,可执行S102所示步骤,向第一终端装置发送第一消息,其中,第一消息可包含以上实施例中介绍的S102中由AMF发送的内容。
下面结合图3,介绍由控制节点包括SMF时本申请实施例提供的拥塞控制方法。该拥塞控制方法中可由SMF响应于数据处理节点出现的拥塞状态进行拥塞控制,以降低数据对于数据处理节点的占用。
如图3所示,当由SMF执行以上拥塞控制方法时,本申请实施例提供的一种拥塞控制方法可包括以下步骤:
S201:AF和/或NWDAF向SMF发送第二终端装置的标识。
相应地,SMF从AF和/或NWDAF接收第二终端装置的标识。
可选地,SMF还可从AF和/或NWDAF接收第二终端装置所处异常状态的标识。
在一种具体的示例中,NWDAF可以根据现有技术检测出一个或多个终端装置存在DDoS攻击或其他异常行为,这里的一个或多个存在异常行为的终端装置即第二终端装置,NWDAF可将第二终端装置的标识发送至SMF。此时终端装置ID可以是移动网络内部标识,例如SUPI、国际移动设备识别码(international mobile equipment identity,IMEI)、内部组标识(internal group ID)、跟踪区编码(tracking area code,TAC)等。SEDF还可向SMF发送异常行为ID,如用于指示终端装置存在的异常行为的ID。
在另一种具体的示例中,AF例如防火墙、入侵检测系统等安全检测设备时,AF可以根据流经AF的用户面数据,通过安全检测算法检测存在安全威胁的流量。此时AF首先检测出恶意流量的外部身份标识,例如IP地址或GPSI,将外部身份标识发送到NEF。NEF 将外部标识映射为第二终端装置的内部身份标识,这里内部身份标识例如SUPI、IMEI、internal group ID、TAC等。此后,可由NEF将第二终端装置的内部身份标识发送到SMF。可选的,AF还可向SMF发送异常行为ID,便于对具有同一异常行为ID的第二终端装置进行管理。
S202:SMF存储列表,该列表包括第二终端装置的标识。
其中,列表中可包括第二终端装置的标识。
S203:数据处理节点在确定自身处于拥塞状态后,向SMF发送第一指示,用于指示数据处理节点处于拥塞状态。
相应地,SMF接收来自数据处理节点的第一指示,并根据第一指示确定数据处理节点处于拥塞状态。
可选地,第一指示包括数据处理节点的标识。
其中,以上数据处理节点可包括UPF和/或NEF。
在S203执行之前,SMF还可向数据处理节点发送第二指示,用于指示数据处理节点在处于拥塞状态后,向SMF发送以上第一指示。示例性的,第二指示可包括第一占用率阈值和/或第一丢包率阈值。
S204:SMF向列表中的终端装置的标识所对应的第一终端装置发送第一消息,第一消息用于指示第一终端装置释放用户面连接。
相应地,第一终端装置接收第一消息。
示例性的,第一消息可携带用户面连接的标识。
SMF可根据S202所示的列表,从列表中的标识所属的终端装置中选择一个或多个第一终端装置,并向一个或多个第一终端装置发送第一消息。根据S202所示方法,当SMF在计时达到某一时长时,可将该时长对应的标识从列表中删除,或者,可删除该时长对应的列表,因此SMF可在以上列表及列表中的标识的存续期间,针对列表中的标识所属的第一终端装置进行控制。另外,当列表中的标识对应的计时超时后,可认为该标识所属的终端装置造成数据处理节点拥塞的可能性较低,因此可从列表中删除该标识。或者,在第二时长的计时超时后,SMF可删除第二时长对应的整个列表,或从该列表中删除全部的标识。
以上第一消息,可携带第五指示,第五指示可用于指示第一终端装置不发送该第一消息对应的响应消息。
在根据以上S203确定数据处理节点处于拥塞状态后,若SMF接收来自第一终端装置的用户面建立请求,则SMF可向第一终端装置发送用户面建立请求对应的拒绝响应。进一步的,用户面建立请求对应的拒绝响应还可用于指示第一终端装置在第三时长内,不再发送用户面建立请求。
另外在实施中,SMF还可将以上第一消息替换为第三消息,其中,第三消息用于指示将第一终端装置的用户面连接对应的QoS等级设置为第一QoS等级。第三消息还可携带用户面连接的标识。
以上第三消息,可携带指示信息,指示信息可用于指示第一终端装置不发送该第一消息对应的响应消息。
S205:第一终端装置根据第一消息,释放用户面连接。
具体的,当第一消息包含用户面连接的标识时,第一终端装置可释放该标识所属的用 户面连接。或者,当第一消息不包含用户面连接的标识时,第一终端装置可释放自身的全部用户面连接。
若以上第一消息包括第五指示,第一终端装置还可响应于第五指示,忽略向SMF发送该第一消息对应的响应消息。
另外,若将第一消息替换为以上第三消息,则第一终端装置可根据第三消息将第一终端装置的用户面连接对应的QoS等级设置为第一QoS等级。其中,当第三消息包括用户面连接的标识时,第一终端装置可将该标识所属的用户面连接的QoS等级设置为第一QoS等级。或者,当第三消息不包括用户面连接的标识时,第一终端装置可将全部的用户面连接的QoS等级设置为第一QoS等级。
若以上第三消息包括指示信息,第一终端装置可响应于指示信息,忽略向SMF发送该第三消息对应的响应消息。
可选地,在S205之后,还可执行以下步骤:
S206:数据处理节点确定自身不再处于拥塞状态;
S207:数据处理节点向SMF发送第三指示,第三指示可用于指示数据处理节点未处于拥塞状态。
在S207执行之前,SMF还可向数据处理节点发送第四指示,用于指示数据处理节点在未处于拥塞状态时向SMF发送以上第三指示。示例性的,第四指示可包括第二占用率阈值和/或第二丢包率阈值。
S208:SMF根据第三指示,确定数据处理节点未处于拥塞状态。
示例性的,在确定数据处理节点未处于拥塞状态后,SMF不再禁止建立第一终端装置的用户面连接。具体的,若SMF接收来自第一终端装置的用户面连接建立请求,则SMF可向第一终端装置发送用户面连接建立请求对应的接受响应。
示例性的,SMF可在S203中处于拥塞状态的部分或全部数据处理节点均未处于拥塞状态后,执行S208所示步骤。
下面结合图4,介绍由控制节点包括AMF时本申请实施例提供的拥塞控制方法。该拥塞控制方法中可由AMF响应于数据处理节点出现的拥塞状态进行拥塞控制,以降低数据对于数据处理节点的占用。
如图4所述,当由AMF执行拥塞控制方法时,本申请实施例提供的一种拥塞控制方法可包括以下步骤:
S301:AF和/或NWDAF向AMF发送第二终端装置的标识。
相应地,AMF从AF和/或NWDAF接收第二终端装置的标识。
可选地,AMF还可从AF和/或NWDAF接收第二终端装置所处异常状态的标识。
NWDAF和/或AF确定第二终端装置的标识的方式可参照前述介绍。
S302:AMF存储列表,该列表包括第二终端装置的标识。
S303:数据处理节点在确定自身处于拥塞状态后,向SMF发送第一指示,第一指示用于指示数据处理节点处于拥塞状态。其中,第一指示可包括处于拥塞状态的数据处理节点的标识。
相应地,SMF接收来自数据处理节点的第一指示。
其中,以上数据处理节点可包括UPF和/或NEF。
在S303执行之前,SMF可向数据处理节点发送第二指示,第二指示用于指示数据处 理节点在处于拥塞状态后,向SMF发送以上第一指示。示例性的,第二指示可包括第一占用率阈值和/或第一丢包率阈值。
S304:SMF向AMF发送第一指示。
相应地,AMF接收第一指示,并根据第一指示确定数据处理节点处于拥塞状态。
另外,若数据处理节点包括NEF,以上S303以及S304所示步骤也可替换为S305以及S306。
S305:SMF向数据处理节点发送第二指示。第二指示中包括AMF的标识。第二指示用于指示数据处理节点在处于拥塞状态后,向AMF发送第一指示。
S306:数据处理节点在确定自身处于拥塞状态后,根据第二指示向AMF发送第一指示,第一指示用于指示数据处理节点处于拥塞状态。
相应地,AMF接收第一指示,并根据第一指示确定数据处理节点处于拥塞状态。
S307:AMF向列表中的终端装置的标识所对应的第一终端装置发送第一消息,第一消息用于指示第一终端装置释放用户面连接。
相应地,第一终端装置接收第一消息。
示例性的,第一消息可携带用户面连接的标识。
以上第一消息,可携带第五指示,第五指示可用于指示第一终端装置不发送该第一消息对应的响应消息。
在根据以上S304或S306确定数据处理节点处于拥塞状态后,若AMF接收来自第一终端装置的信令请求,则AMF向第一终端装置发送信令建立请求对应的拒绝响应。进一步的,信令建立请求对应的拒绝响应还可用于指示第一终端装置在第四时长内,不再发送信令建立请求。
在根据以上S304或S306确定数据处理节点处于拥塞状态后,AMF可向第一终端装置发送第二消息,第二消息可用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域不支持所述第一终端装置请求建立信令连接。
以上第二消息,可携带指示信息,指示信息可用于指示第一终端装置不发送该第一消息对应的响应消息。
S308:第一终端装置根据第一消息,释放用户面连接。
具体的,当第一消息包含用户面连接的标识时,第一终端装置可释放该标识所属的用户面连接。或者,当第一消息不包含用户面连接的标识时,第一终端装置可释放自身的全部用户面连接。
若以上第一消息包括第五指示,第一终端装置还可响应于第五指示,忽略向SMF发送该第一消息对应的响应消息。
另外,若第一终端装置从AMF接收第二消息,则第一终端装置可根据第二消息将第一终端装置的所处位置设置为不支持区域,从而不再发送信令连接建立请求。
可选地,在S308之后,还可执行以下步骤:
S309:数据处理节点确定不再处于拥塞状态。
S310:数据处理节点向SMF发送第三指示,第三指示可用于指示数据处理节点未处于拥塞状态。其中,第三指示可包括该数据处理节点的标识。
相应地,SMF接收来自数据处理节点的第一指示。
在S310执行之前,SMF还可向数据处理节点发送第四指示,用于指示数据处理节点 在未处于拥塞状态时向SMF发送以上第三指示。
S311:SMF向AMF发送第三指示。
相应地,AMF接收第三指示。
另外,若数据处理节点包括NEF,以上S309至S311所示步骤也可替换为S312以及S313。
S312:SMF向数据处理节点发送第四指示。第四指示中包括AMF的标识。第四指示用于指示数据处理节点在未处于拥塞状态时,向AMF发送第三指示。
S313:数据处理节点确定自身不再处于拥塞状态,并根据第四指示向AMF发送第三指示,第三指示用于指示数据处理节点处于拥塞状态。其中,第三指示可包括该数据处理节点的标识。
相应地,AMF接收第三指示。
S314:AMF根据第三指示,确定数据处理节点未处于拥塞状态。
其中第三指示可以是AMF通过S311或S313接收的。
示例性的,在确定数据处理节点未处于拥塞状态后,AMF不再禁止建立第一终端装置的信令连接。具体的,若AMF接收来自第一终端装置的信令建立请求,则AMF可向第一终端装置发送信令建立请求对应的接受响应。
示例性的,AMF可在S304或S306中处于拥塞状态的部分或全部数据处理节点均未处于拥塞状态后,执行S313所示步骤。
另外,本申请实施例提供的拥塞控制方法,还可由数据处理节点执行,其中,数据处理节点包括UPF和/或NEF。此时,该方法可包括如图5所示以下步骤:
S401:AF和/或NWDAF向SMF发送第二终端装置的标识。
SMF还可从AF和/或NWDAF接收由AF和/或NWDAF识别的异常行为的受害者地址。其中,受害者地址例如第二终端装置的DDoS攻击的受害者IP地址或媒体访问控制(media access control,MAC)地址。异常行为的受害者地址与存在异常行为的第二终端装置对应。
S402:SMF将第二终端装置的标识映射为第二终端装置的地址。
其中,第二终端装置的地址可用于数据处理节点识别第二终端装置。
示例性的,若数据处理节点包括UPF,则第二终端装置的地址可包括IP地址。若数据处理节点包括NEF,则第二终端装置的地址可包括MAC地址。
示例性的,SMF还可通过PCF将受害者地址映射为数据包过滤器。数据包过滤器可以由IP地址组成,例如源IP地址为全0,目标IP地址为受害者IP地址,或者源IP地址为第一终端装置的IP地址,目标IP为受害者IP地址。数据包过滤器还可以由MAC组成,例如源MAC地址为全0,目标MAC地址为受害者MAC地址,或者源MAC地址为UE MAC地址,目标MAC地址为受害者MAC地址。
S403:SMF将第二终端装置的地址发送至数据处理节点。
相应地,数据处理节点接收第二终端装置的地址。
示例性的,SMF可将数据包过滤器发送至数据处理节点。
S404:数据处理节点存储列表,该列表包括第二终端装置的地址。
从而数据处理节点可存储处于异常状态的终端装置的地址列表。
示例性的,列表中可包括第二终端装置的地址以及数据包过滤器的对应关系。
示例性的,数据处理节点可设置第二终端装置的地址对应的第三时长,或设置列表对应的第四时长。其中,第三时长的设置方式及使用规则可参照前述第一时长。第四时长的设置方式及使用规则可参照前述第二时长。
S405:数据处理节点确定自身处于拥塞状态。
S406:数据处理节点对来自列表包含的第一终端装置的地址的上行数据包进行丢弃处理。
示例性的,数据处理节判断需要转发的数据包的源IP地址是否包含在列表中,若是,则数据处理节点可对该数据包进行丢弃处理。
示例性的,若列表中包括地址以及数据包过滤器之间的对应关系,则数据处理节点可根据该对应关系,丢弃数据包。例如,数据包过滤器中的源IP地址全0,目标IP地址为受害者IP地址时,数据处理节点根据列表中的地址获得该地址发送的所有数据包,根据包过滤器,丢弃其中目标IP地址为受害者IP地址的数据包。
可选地,该方法还可包括以下步骤:
S407:数据处理节点确定自身不再处于拥塞状态。
S408:数据处理节点不再根据列表包含的地址丢弃数据包。
下面结合图6,介绍由控制节点包括AMF时本申请实施例提供的拥塞控制方法。该拥塞控制方法中可由AMF响应于数据处理节点SMF出现的拥塞状态进行拥塞控制,以降低数据对于数据处理节点的占用。
S501:AF和/或NWDAF向AMF发送第二终端装置的标识。
相应地,AMF从AF和/或NWDAF接收第二终端装置的标识。
可选地,AMF还可从AF和/或NWDAF接收第二终端装置所处异常状态的标识。
NWDAF和/或AF确定第二终端装置的标识的方式可参照前述介绍。
S502:AMF存储列表,该列表包括第二终端装置的标识。
其中,列表中可包括第二终端装置的标识。
S503:数据处理节点SMF向AMF发送第一指示。
其中,第一指示用于指示SMF处于拥塞状态,该第一指示可以是SMF确定自身进入拥塞状态后发送的。
或者,数据处理节点SMF可在满足发送第一指示的特定条件时向AMF发送第一指示,第一指示可用于指示SMF的运行状态。其中,第一指示可包括SMF的标识。
相应地,AMF接收来自SMF的第一指示。
在S503执行之前,AMF可向数据处理节点SMF发送第二指示,第二指示用于指示数据处理节点SMF在处于拥塞状态后,向AMF发送以上第一指示。示例性的,第二指示可包括第一占用率阈值和/或第一丢包率阈值。
或者,第二指示可用于指示SMF在满足发送第一指示的特定条件时向AMF发送用于指示SMF的运行状态的第一指示。
S504:AMF根据第一指示确定SMF处于拥塞状态。
S505:AMF向第一终端装置发送第一消息,第一消息用于指示第一终端装置释放用户面连接。
相应地,第一终端装置接收第一消息。
示例性的,第一消息可携带用户面连接的标识。
以上第一消息,可携带第五指示,第五指示可用于指示第一终端装置不发送该第一消息对应的响应消息。
在确定数据处理节点处于拥塞状态后,若AMF接收来自第一终端装置的信令请求,则AMF向第一终端装置发送信令建立请求对应的拒绝响应。进一步的,信令建立请求对应的拒绝响应还可用于指示第一终端装置在第四时长内,不再发送信令建立请求。
在确定数据处理节点处于拥塞状态后,AMF可向第一终端装置发送第二消息,第二消息可用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域不支持所述第一终端装置请求建立信令连接。
以上第二消息,可携带指示信息,指示信息可用于指示第一终端装置不发送该第一消息对应的响应消息。
S506:第一终端装置根据第一消息,释放用户面连接。
具体的,当第一消息包含用户面连接的标识时,第一终端装置可释放该标识所属的用户面连接。或者,当第一消息不包含用户面连接的标识时,第一终端装置可释放自身的全部用户面连接。
若以上第一消息包括第五指示,第一终端装置还可响应于第五指示,忽略向SMF发送该第一消息对应的响应消息。
另外,若第一终端装置从AMF接收第二消息,则第一终端装置可根据第二消息将第一终端装置的所处位置设置为不支持区域,从而不再发送信令连接建立请求。
可选地,在S506之后,还可执行以下步骤:
S507:数据处理节点SMF向AMF发送第三指示。其中,第三指示可包括该数据处理节点的标识。
其中,第三指示可用于指示SMF不再处于拥塞状态,此时第三指示可以是SMF确定自身未处于拥塞状态后发送的。
或者,第三指示可用于指示SMF的运行状态,此时第三指示可以是SMF在满足发送第三指示的特定条件后发送的。
相应地,SMF接收来自数据处理节点的第一指示。
在S507执行之前,AMF还可向SMF发送第四指示。
其中,第四指示可用于指示SMF在未处于拥塞状态时向SMF发送用于指示数据处理节点未处于拥塞状态的第三指示。
或者,第四指示可用于指示SMF在满足发送第三指示的特定条件后发送用于指示SMF的运行状态的第三指示。
S508:AMF根据第三指示,确定数据处理节点未处于拥塞状态。
示例性的,在确定数据处理节点未处于拥塞状态后,AMF不再禁止建立第一终端装置的信令连接。具体的,若AMF接收来自第一终端装置的信令建立请求,则AMF可向第一终端装置发送信令建立请求对应的接受响应。
基于与以上方法实施例相同的发明构思,本申请实施例还提供了一种通信装置,该通信装置可具备上述方法实施例中的控制节点、第一终端装置或者数据处理节点其中任一的功能,并可用于执行上述方法实施例提供的由控制节点、第一终端装置或者数据处理节点其中任一执行的步骤。该功能可以通过硬件实现,也可以通过软件或者硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。
在一种可能的实现方式中,如图7所示的通信装置700可作为上述方法实施例所涉及的控制节点,并执行上述方法实施例中由控制节点执行的步骤。其中,控制节点可包括SMF和/或AMF。如图7所示,该通信装置700可包括通信模块701以及处理模块702,以上通信模块701以及处理模块702之间相互耦合。该通信模块701可用于支持通信装置700进行通信,通信模块701可具备有线通信功能,例如能够通过有线方式与其他网元进行通信。处理模块702可用于支持该通信装置700执行上述方法实施例中的处理动作,包括但不限于:生成由通信模块701发送的信息、消息,和/或,对通信模块701接收的信号进行解调解码等等。
在执行上述方法实施例中由控制节点执行的步骤时,以上处理模块702可用于确定数据处理节点处于拥塞状态,所述数据处理节点用于处理终端装置发送的数据;以上通信模块701可用于向所述控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,所述列表中的终端装置的标识为所述控制节点所接收的处于异常状态下的所述第一终端装置的标识,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据。
在实施中,通信模块701还可接收第二终端装置的标识,第二终端装置为处于异常状态下的终端装置。
以上每个第二终端装置满足以下条件中的任意一项或多项:第二终端装置的用户面数据的传输过程存在分布式拒绝服务DDoS攻击;或者,第二终端装置的用户面数据的目标地址错误;或者,第二终端装置的用户面数据的传输时长达到阈值时长的用户面数据;或者,第二终端装置的用户面数据的数据长度达到阈值长度的用户面数据;或者,第二终端装置的用户面数据的传输速率达到阈值速率的用户面数据。
若第一时长内该数据处理节点未处于该拥塞状态,以上处理模块702还可从该列表中删除该第二终端装置的标识。
另外,若第二时长内该数据处理节点未处于该拥塞状态,该处理模块702还可删除该列表,或者删除该列表中的全部标识。
以上通信模块701还可用于接收第一指示,该第一指示用于指示该数据处理节点处于该拥塞状态;以上处理模块702可根据该第一指示,确定该数据处理节点处于拥塞状态。
在接收第一指示之前,以上通信模块701还可向数据处理节点发送第二指示,该第二指示用于指示该数据处理节点在处于该拥塞状态时发送该第一指示。
可选地,以上第一消息可包括该用户面连接的标识。
在一种可能的实现方式中,当该控制节点包括SMF,且该数据处理节点的数量为多个时,以上处理模块702还可根据多个该数据处理节点各自的上下文确定数据网络的标识,该多个该数据处理节点中的至少两个数据处理节点支持该数据网络,该多个该数据处理节点各自的上下文存储于该控制节点,每个该数据处理节点的上下文包括该每个该数据处理节点支持的数据网络的标识;以及,处理模块702可根据该第一终端装置的上下文以及该数据网络的标识,确定该用户面连接的标识,该第一终端装置的上下文存储于该控制节点,该第一终端装置的上下文包括接入该数据网络的该用户面连接的标识。
在另一种可能的实现方式中,当该控制节点包括AMF,且该数据处理节点的数量为多个时,以上通信模块701还可用于从SMF接收数据网络的标识,该多个该数据处理节点中的至少两个数据处理节点支持该数据网络;以上处理模块702还可用于根据该第一终端 装置的上下文以及该数据网络的标识,确定该用户面连接的标识,该第一终端装置的上下文存储于该控制节点,该第一终端装置的上下文包括接入该数据网络的该用户面连接的标识。
在确定数据处理节点处于拥塞状态后,当该控制节点为SMF,以上通信模块701还可在接收来自该第一终端装置的第一用户面连接建立请求后,向该第一终端装置发送该拒绝响应,该拒绝响应与该第一用户面连接建立请求对应,该拒绝响应用于指示该第一终端装置在第三时长内不发送用户面连接建立请求。
以上处理模块702还可用于确定该数据处理节点未处于该拥塞状态,则以上通信模块701还可在接收来自该第一终端装置的第二用户面连接建立请求后,向该第一终端装置发送接受响应,该接受响应对应该第二用户面连接建立请求。
在确定数据处理节点处于拥塞状态后,当该控制节点为AMF,以上通信模块701还可在接收来自该第一终端装置的第一信令连接建立请求后,向该第一终端装置发送拒绝响应,该拒绝响应与该第一信令连接建立请求对应,该拒绝响应用于指示该异常终端装置在第四时长内不发送信令连接建立请求。
以上处理模块702还可用于确定该数据处理节点未处于该拥塞状态,则该通信模块701还可在接收来自该第一终端装置的第二信令连接建立请求后,向该第一终端装置发送接受响应,该接受响应对应该第二信令连接建立请求。
以上通信模块701还可用于接收第三指示,该第三指示用于指示该数据处理节点未处于该拥塞状态。以上处理模块702可根据该第三指示,确定该数据处理节点未处于该拥塞状态。
在接收第三指示之前,通信模块701还可向该数据处理节点发送第四指示,该第四指示用于指示该数据处理节点在未处于该拥塞状态时发送该第三指示。
当该控制节点包括AMF时,通信模块701还可用于向该第一终端装置发送第二消息,该第二消息可用于指示将该第一终端装置的位置设置为不支持区域,该不支持区域不支持该第一终端装置请求建立信令连接。
以上第一消息可包括第五指示,该第五指示用于指示该第一终端装置不回复该第一消息。
在另一种实现方式中,本申请实施例提供的通信装置还可由硬件组件构成,这些硬件组件例如处理器、存储器或者通信接口等。
示例性的,若该通信装置为控制节点,如SMF或AMF,其结构可如图8所示。为便于理解,图8中仅示出了执行本申请所示方法所必须的结构,本申请并不限制通信装置可具备更多组件。该通信装置800可包括通信接口801、存储器802以及处理器803。该通信接口801可以用于通信装置800进行通信,如用于发送或接收信号。具体的,通信接口801可用于通信装置800通过有线方式收发信号,例如,若通信装置800为SMF,通信接口801可以用于通信装置800与AMF、AF、NWDAF、UPF或者NEF等核心网或接入网网元进行通信。又如,若通信装置800为AMF,通信接口801可以用于通信装置800与SMF、AF、NWDAF、UPF或者NEF等核心网或接入网网元进行通信。该存储器802可与该处理器803耦合,其用于保存通信装置800实现各功能所必要的程序和数据。该处理器803被配置为支持通信装置800执行上述方法中相应的处理功能,如生成由通信接口801发送的信息、消息,和/或,对通信接口801接收的信号进行解调解码等等。以上存储器 802以及处理器803可集成于一体也可相互独立。
应理解,以上存储器802和/或通信接口801也可以是外接于通信装置800的。若存储器802以及通信接口801均外接于通信装置800,则此时通信装置800可包括处理器803。
另外应理解,以上通信模块701可具备通信接口801所示结构。以上处理模块702可包括处理器803,或包括处理器803以及存储器802。
以上通信装置800也可由芯片构成。例如,该芯片包含处理器803。另外,该芯片还可包括存储器802以及通信接口801,其中,存储器802、通信接口801以及处理器803三者,两两之间可相互耦合。
在通过如图8所示结构实现以上通信装置时,可由处理器803执行以上由处理模块702所执行的步骤,以及,由通信接口801执行以上由通信模块701所执行的步骤。存储器802可用于存储程序,用于处理器803调用该程序以执行以上处理模块702所执行的步骤。
具体的,在执行上述方法实施例中由控制节点执行的步骤时,以上处理器803可用于确定数据处理节点处于拥塞状态,所述数据处理节点用于处理终端装置发送的数据;以上通信接口801可用于向所述控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,所述列表中的终端装置的标识为所述控制节点所接收的处于异常状态下的所述第一终端装置的标识,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据。
在实施中,通信接口801还可接收第二终端装置的标识,第二终端装置为处于异常状态下的终端装置。
以上每个第二终端装置满足以下条件中的任意一项或多项:第二终端装置的用户面数据的传输过程存在分布式拒绝服务DDoS攻击;或者,第二终端装置的用户面数据的目标地址错误;或者,第二终端装置的用户面数据的传输时长达到阈值时长的用户面数据;或者,第二终端装置的用户面数据的数据长度达到阈值长度的用户面数据;或者,第二终端装置的用户面数据的传输速率达到阈值速率的用户面数据。
若第一时长内该数据处理节点未处于该拥塞状态,以上处理器803还可从该列表中删除该第二终端装置的标识。
另外,若第二时长内该数据处理节点未处于该拥塞状态,该处理器803还可删除该列表,或者删除该列表中的全部标识。
以上通信接口801还可用于接收第一指示,该第一指示用于指示该数据处理节点处于该拥塞状态;以上处理器803可根据该第一指示,确定该数据处理节点处于拥塞状态。
在接收第一指示之前,以上通信接口801还可向数据处理节点发送第二指示,该第二指示用于指示该数据处理节点在处于该拥塞状态时发送该第一指示。
可选地,以上第一消息可包括该用户面连接的标识。
在一种可能的实现方式中,当该控制节点包括SMF,且该数据处理节点的数量为多个时,以上处理器803还可根据多个该数据处理节点各自的上下文确定数据网络的标识,该多个该数据处理节点中的至少两个数据处理节点支持该数据网络,该多个该数据处理节点各自的上下文存储于该控制节点,每个该数据处理节点的上下文包括该每个该数据处理节点支持的数据网络的标识;以及,处理器803可根据该第一终端装置的上下文以及该数据网络的标识,确定该用户面连接的标识,该第一终端装置的上下文存储于该控制节点,该第一终端装置的上下文包括接入该数据网络的该用户面连接的标识。
在另一种可能的实现方式中,当该控制节点包括AMF,且该数据处理节点的数量为多个时,以上通信接口801还可用于从SMF接收数据网络的标识,该多个该数据处理节点中的至少两个数据处理节点支持该数据网络;以上处理器803还可用于根据该第一终端装置的上下文以及该数据网络的标识,确定该用户面连接的标识,该第一终端装置的上下文存储于该控制节点,该第一终端装置的上下文包括接入该数据网络的该用户面连接的标识。
在确定数据处理节点处于拥塞状态后,当该控制节点为SMF,以上通信接口801还可在接收来自该第一终端装置的第一用户面连接建立请求后,向该第一终端装置发送该拒绝响应,该拒绝响应与该第一用户面连接建立请求对应,该拒绝响应用于指示该第一终端装置在第三时长内不发送用户面连接建立请求。
以上处理器803还可用于确定该数据处理节点未处于该拥塞状态,则以上通信接口801还可在接收来自该第一终端装置的第二用户面连接建立请求后,向该第一终端装置发送接受响应,该接受响应对应该第二用户面连接建立请求。
在确定数据处理节点处于拥塞状态后,当该控制节点为AMF,以上通信接口801还可在接收来自该第一终端装置的第一信令连接建立请求后,向该第一终端装置发送拒绝响应,该拒绝响应与该第一信令连接建立请求对应,该拒绝响应用于指示该异常终端装置在第四时长内不发送信令连接建立请求。
以上处理器803还可用于确定该数据处理节点未处于该拥塞状态,则该通信接口801还可在接收来自该第一终端装置的第二信令连接建立请求后,向该第一终端装置发送接受响应,该接受响应对应该第二信令连接建立请求。
以上通信接口801还可用于接收第三指示,该第三指示用于指示该数据处理节点未处于该拥塞状态。以上处理器803可根据该第三指示,确定该数据处理节点未处于该拥塞状态。
在接收第三指示之前,通信接口801还可向该数据处理节点发送第四指示,该第四指示用于指示该数据处理节点在未处于该拥塞状态时发送该第三指示。
当该控制节点包括AMF时,通信接口801还可用于向该第一终端装置发送第二消息,该第二消息可用于指示将该第一终端装置的位置设置为不支持区域,该不支持区域不支持该第一终端装置请求建立信令连接。
以上第一消息可包括第五指示,该第五指示用于指示该第一终端装置不回复该第一消息。
在一种可能的实现方式中,如图9所示的通信装置900可作为上述方法实施例所涉及的第一终端装置,并执行上述方法实施例中由第一终端装置执行的步骤。示例性的,第一终端装置可包括本申请所述UE或终端装置。如图9所示,该通信装置900可包括通信模块901以及处理模块902,以上通信模块901以及处理模块902之间相互耦合。该通信模块901可用于支持通信装置900进行通信,通信模块901可具备无线通信功能。处理模块902可用于支持该通信装置900执行上述方法实施例中的处理动作,包括但不限于:生成由通信模块901发送的信息、消息,和/或,对通信模块901接收的信号进行解调解码等等。
在执行以上方法实施例中由第一终端装置执行的步骤时,通信模块901可用于从控制节点接收第一消息,该第一消息用于指示释放用户面连接,该用户面连接用于传输该终端装置的数据,该第一控制消息包括第五指示,该第五指示用于指示该第一终端装置不回复该第一消息;处理模块902可用于释放该用户面连接。
在另一种实现方式中,本申请实施例提供的通信装置还可由硬件组件构成,这些硬件组件例如处理器、存储器或者收发器等。
当该通信装置为以上第一终端装置时,其结构还可如图10所示。便于理解和图示方便,图10中,以手机为例说明该通信装置1000的结构。如图10所示,通信装置1000可包括处理器1001、存储器1002以及收发器1003。
以上处理器1001可用于对通信协议以及通信数据进行处理,以及对第一终端装置进行控制,执行软件程序,处理软件程序的数据等。存储器1002可用于存储程序和数据,处理器1001可基于该程序执行本申请实施例中由第一终端装置执行的方法。
收发器1003可包括射频单元以及天线。其中,射频单元可用于基带信号与射频信号的转换以及对射频信号的处理。天线可用于收发电磁波形式的射频信号。另外,也可仅将射频单元视为收发器1003,则此时通信装置1000可包括处理器1001、存储器1002、收发器1003以及天线。
另外,该通信装置1000还可包括输入输出装置1004,如触摸屏、显示屏或者键盘等可用于接收用户输入的数据以及对用户输出数据的组件。需要说明的是,有些种类的通信装置可以不具有输入输出装置。
应理解,以上通信模块901可具备收发器1003所示结构,即包括射频单元以及天线;或者,通信模块901可包括以上射频单元。以上处理模块902可包括处理器1001,或包括处理器1001以及存储器1002。
以上通信装置1000也可由芯片构成。例如,该芯片包含处理器1001。另外,该芯片还可包括存储器1002以及收发器1003,其中,存储器1002、收发器1003以及处理器1001三者,两两之间可相互耦合。
在执行本申请实施例所示方法时,该收发器1003可用于执行上述通信模块901执行的步骤。以及,由处理器1001调用存储器1002中存储的程序,执行以上处理模块902所执行的步骤。
具体的,在执行以上方法实施例中由第一终端装置执行的步骤时,收发器1003可用于从控制节点接收第一消息,该第一消息用于指示释放用户面连接,该用户面连接用于传输该终端装置的数据,该第一控制消息包括第五指示,该第五指示用于指示该第一终端装置不回复该第一消息;处理器1001可用于释放该用户面连接。
在一种可能的实现方式中,如图11所示的通信装置1100可作为上述方法实施例所涉及的数据处理节点,并执行上述方法实施例中由数据处理节点执行的步骤。其中,数据处理节点可包括UPF和/或NEF。如图11所示,该通信装置1100可包括通信模块1101以及处理模块1102,以上通信模块1101以及处理模块1102之间相互耦合。该通信模块1101可用于支持通信装置1100进行通信,通信模块1101可具备有线通信功能,例如能够通过有线方式与其他网元进行通信。处理模块1102可用于支持该通信装置1100执行上述方法实施例中的处理动作,包括但不限于:生成由通信模块1101发送的信息、消息,和/或,对通信模块1101接收的信号进行解调解码等等。
在执行上述方法实施例中由数据处理节点执行的步骤时,处理模块1102可用于确定自身不再处于拥塞状态;通信模块1101可用于向控制节点发送第三指示,该第三指示用于指示该数据处理节点处于该拥塞状态。
以上第三指示可包括该数据处理节点的标识。
在发送以上第三指示之前,以上通信模块1101还可用于从该控制节点接收第四指示,该第四指示用于数据处理节点指示未处于该拥塞状态的该数据处理节点发送该第三指示。
在另一种实现方式中,本申请实施例提供的通信装置还可由硬件组件构成,这些硬件组件例如处理器、存储器或者通信接口等。
示例性的,若该通信装置为控制节点,如NEF或UPF,其结构可如图12所示。为便于理解,图12中仅示出了执行本申请所示方法所必须的结构,本申请并不限制通信装置可具备更多组件。该通信装置1200可包括通信接口1201、存储器1202以及处理器1203。该通信接口1201可以用于通信装置1200进行通信,如用于发送或接收信号。具体的,通信接口1201可用于通信装置1200通过有线方式收发信号,例如,若通信装置1200为UPF,通信接口1201可以用于通信装置1200与SMF、RAN或者DN或其他核心网或接入网网元进行通信。又如,若通信装置1200为NEF,通信接口1201可以用于通信装置1200与SMF、AMF或者其他核心网或接入网网元进行通信。该存储器1202可与该处理器1203耦合,其可用于保存通信装置1200实现各功能所必要的程序和数据。该处理器1203被配置为支持通信装置1200执行上述方法中相应的处理功能,如生成由通信接口1201发送的信息、消息,和/或,对通信接口1201接收的信号进行解调解码等等。以上存储器1202以及处理器1203可集成于一体也可相互独立。
应理解,以上存储器1202和/或通信接口1201也可以是外接于通信装置1200的。若存储器1202以及通信接口1201均外接于通信装置1200,则此时通信装置1200可包括处理器1203。
另外应理解,以上通信模块1101可具备通信接口1201所示结构。以上处理模块1102可包括处理器1203,或包括处理器1203以及存储器1202。
以上通信装置1200也可由芯片构成。例如,该芯片包含处理器1203。另外,该芯片还可包括存储器1202以及通信接口1201,其中,存储器1202、通信接口1201以及处理器1203三者,两两之间可相互耦合。
在通过如图12所示结构实现以上通信装置时,可由处理器1203执行以上处理模块1102所执行的步骤,以及,由通信接口1201执行以上通信模块1101所执行的步骤。存储器1202可用于存储程序,用于处理器1203调用该程序以执行以上处理模块1102所执行的步骤。
在执行上述方法实施例中由数据处理节点执行的步骤时,处理器1203可用于确定自身不再处于拥塞状态;通信接口1201可用于向控制节点发送第三指示,该第三指示用于指示该数据处理节点处于该拥塞状态。
以上第三指示可包括该数据处理节点的标识。
在发送以上第三指示之前,以上通信接口1201还可用于从该控制节点接收第四指示,该第四指示用于数据处理节点指示未处于该拥塞状态的该数据处理节点发送该第三指示。
应理解,以上实施例中对于通信装置所包含组件是示意性的,仅仅为一种可能的示例,其实际实现时可以具有另外的构成方式。另外,以上通信装置中的各组件可以集成在一个模块中,也可以是单独的物理存在。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现,不应理解为以以上附图所示结构为限。
基于与上述方法实施例相同构思,本申请还提供一种通信系统,该通信系统可包括以上控制节点及数据处理节点,或包括以上控制节点、第二终端装置以及数据处理节点。该 通信系统可用于实现上述方法实施例、方法实施例的任意一种可能的实现方式中由控制节点、第二终端装置或者数据处理节点执行的操作。示例性的,该通信系统具有如图4所示结构。
具体的,在实施本申请实施例提供的拥塞控制方法时,该通信系统可包括控制节点以及数据处理节点。该通信系统中,该控制节点可用于确定该数据处理节点处于拥塞状态,该数据处理节点用于处理终端装置发送的数据。该控制节点还可向该控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,该列表中的终端装置的标识为该控制节点所接收的处于异常状态下的该第一终端装置的标识,该第一消息用于指示释放用户面连接,该用户面连接用于传输该第一终端装置的数据。
该数据控制节点可用于向控制节点发送第一指示。相应地,控制节点可从数据处理节点接收第一指示。该第一指示可用于指示数据控制节点处于拥塞状态。
可选地,该通信系统还可包括第一终端装置。该第一终端装置可用于从控制节点接收第一消息,并根据第一消息释放用户面连接。
可选地,该通信系统中,该数据处理节点还可向该控制节点发送第三指示。相应地,控制节点可从数据处理节点接收第三指示。该第三指示可用于指示数据处理节点未处于拥塞状态。第三指示可以是数据处理节点不再处于拥塞状态后发送的。
基于与上述方法实施例相同构思,本申请实施例中还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时,使该计算机执行上述方法实施例、方法实施例的任意一种可能的实现方式中由控制节点、第二终端装置或者数据处理节点执行的操作。
基于与上述方法实施例相同构思,本申请还提供一种计算机程序产品,该计算机程序产品在被计算机调用执行时,可以使得计算机实现上述方法实施例、方法实施例的任意一种可能的实现方式中由控制节点、第二终端装置或者数据处理节点执行的操作。
基于与上述方法实施例相同构思,本申请还提供一种芯片或芯片系统,该芯片可包括处理器。该芯片还可包括存储器(或存储模块)和/或收发器(或通信模块),或者,该芯片与存储器(或存储模块)和/或收发器(或通信模块)耦合,其中,收发器(或通信模块)可用于支持该芯片进行有线和/或无线通信,存储器(或存储模块)可用于存储程序,该处理器调用该程序可用于实现上述方法实施例、方法实施例的任意一种可能的实现方式中由控制节点、第二终端装置或者数据处理节点执行的操作。该芯片系统可包括以上芯片,也可以包含上述芯片和其他分立器件,如存储器(或存储模块)和/或收发器(或通信模块)。
本申请实施例是参照实施例所涉及的方法、装置、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。

Claims (31)

  1. 一种拥塞控制方法,其特征在于,包括:
    控制节点确定数据处理节点处于拥塞状态,所述数据处理节点用于处理终端装置发送的数据;
    所述控制节点向所述控制节点所存储的列表中的终端装置的标识所对应的第一终端装置发送第一消息,所述列表中的终端装置的标识为所述控制节点所接收的处于异常状态下的所述第一终端装置的标识,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    控制节点接收第二终端装置的标识,所述第二终端装置为处于异常状态下的终端装置;所述第二终端标识包含在所述列表中;若第一时长内所述数据处理节点未处于所述拥塞状态,所述控制节点从所述列表中删除所述第二终端装置的标识。
  3. 如权利要求1所述的方法,其特征在于,若第二时长内所述数据处理节点未处于所述拥塞状态,所述方法还包括:
    所述控制节点删除所述列表;或者,
    所述控制节点删除所述列表中的全部标识。
  4. 如权利要求1-3中任一所述的方法,其特征在于,所述控制节点确定数据处理节点处于拥塞状态,包括:
    所述控制节点接收第一指示,所述第一指示用于指示所述数据处理节点处于所述拥塞状态。
  5. 如权利要求4所述的方法,其特征在于,所述方法还包括:
    所述控制节点向所述数据处理节点发送第二指示,所述第二指示用于指示所述数据处理节点在处于所述拥塞状态时发送所述第一指示。
  6. 如权利要求1-5中任一所述的方法,其特征在于,所述第一消息包括所述用户面连接的标识。
  7. 如权利要求6所述的方法,其特征在于,当所述控制节点包括会话管理功能SMF,且所述数据处理节点的数量为多个时,所述方法还包括:
    所述控制节点根据多个所述数据处理节点各自的上下文确定数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络,所述多个所述数据处理节点各自的上下文存储于所述控制节点,每个所述数据处理节点的上下文包括所述每个所述数据处理节点支持的数据网络的标识;
    所述控制节点根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
  8. 如权利要求6所述的方法,其特征在于,当所述控制节点包括接入与移动性管理功能AMF,且所述数据处理节点的数量为多个时,所述方法还包括:
    所述控制节点从SMF接收数据网络的标识,所述多个所述数据处理节点中的至少两个数据处理节点支持所述数据网络;
    所述控制节点根据所述第一终端装置的上下文以及所述数据网络的标识,确定所述用 户面连接的标识,所述第一终端装置的上下文存储于所述控制节点,所述第一终端装置的上下文包括接入所述数据网络的所述用户面连接的标识。
  9. 如权利要求1-8中任一所述的方法,其特征在于,当所述控制节点包括SMF时,所述方法还包括:
    所述控制节点接收来自所述第一终端装置的第一用户面连接建立请求;
    所述控制节点向所述第一终端装置发送所述拒绝响应,所述拒绝响应与所述第一用户面连接建立请求对应,所述拒绝响应用于指示所述第一终端装置在第三时长内不发送用户面连接建立请求。
  10. 如权利要求9所述的方法,其特征在于,所述方法还包括:
    所述控制节点确定所述数据处理节点未处于所述拥塞状态;
    所述控制节点接收来自所述第一终端装置的第二用户面连接建立请求;
    所述控制节点向所述第一终端装置发送接受响应,所述接受响应对应所述第二用户面连接建立请求。
  11. 如权利要求1-8中任一所述的方法,其特征在于,当所述控制节点包括AMF时,所述方法还包括:
    所述控制节点接收来自所述第一终端装置的第一信令连接建立请求;
    所述控制节点向所述第一终端装置发送拒绝响应,所述拒绝响应与所述第一信令连接建立请求对应,所述拒绝响应用于指示所述异常终端装置在第四时长内不发送信令连接建立请求。
  12. 如权利要求11所述的方法,其特征在于,所述方法还包括:
    所述控制节点确定所述数据处理节点未处于所述拥塞状态;
    所述控制节点接收来自所述第一终端装置的第二信令连接建立请求;
    所述控制节点向所述第一终端装置发送接受响应,所述接受响应对应所述第二信令连接建立请求。
  13. 如权利要求10或12所述的方法,其特征在于,所述控制节点确定所述数据处理节点未处于所述拥塞状态,包括:
    所述控制节点接收第三指示,所述第三指示用于指示所述数据处理节点未处于所述拥塞状态。
  14. 如权利要求13所述的方法,其特征在于,所述方法还包括:
    所述控制节点向所述数据处理节点发送第四指示,所述第四指示用于指示所述数据处理节点在未处于所述拥塞状态时发送所述第三指示。
  15. 如权利要求1-14中任一所述的方法,其特征在于,当所述控制节点包括AMF时,所述方法还包括:
    所述控制节点向所述第一终端装置发送第一消息,所述第一消息用于指示将所述第一终端装置的位置设置为不支持区域,所述不支持区域不支持所述第一终端装置请求建立信令连接。
  16. 如权利要求1-15中任一所述的方法,其特征在于,
    所述第一消息包括第五指示,所述第五指示用于指示所述第一终端装置不回复所述第一消息。
  17. 一种拥塞控制方法,其特征在于,包括:
    第一终端装置从控制节点接收第一消息,所述第一消息用于指示释放用户面连接,所述用户面连接用于传输所述第一终端装置的数据,所述第一控制消息包括第五指示;所述第五指示用于指示所述第一终端装置不回复所述第一消息;
    所述第一终端装置释放所述用户面连接。
  18. 一种拥塞控制方法,其特征在于,包括:
    数据处理节点确定自身不再处于拥塞状态;
    所述数据处理节点向控制节点发送第三指示,所述第三指示用于指示所述数据处理节点未处于所述拥塞状态。
  19. 如权利要求18所述的方法,其特征在于,所述第三指示包括所述数据处理节点的标识。
  20. 如权利要求18或19所述的方法,其特征在于,所述方法还包括:
    所述数据处理节点从所述控制节点接收第四指示,所述第四指示用于指示所述数据处理节点未处于所述拥塞状态时发送所述第三指示。
  21. 一种通信装置,其特征在于,所述通信装置用于执行如权利要求1-16中任一所述的方法。
  22. 一种通信装置,其特征在于,所述通信装置用于执行如权利要求17所述的方法。
  23. 一种通信装置,其特征在于,所述通信装置用于执行如权利要求18-20中任一所述的方法。
  24. 一种通信装置,其特征在于,包括:
    存储器:用于存储指令;
    处理器,用于从所述存储器中调用并运行所述指令,使得所述通信装置执行如权利要求1至16中任意一项所述的方法。
  25. 一种通信装置,其特征在于,包括:
    存储器:用于存储指令;
    处理器,用于从所述存储器中调用并运行所述指令,使得所述通信装置执行如权利要求17所述的方法。
  26. 一种通信装置,其特征在于,包括:
    存储器:用于存储指令;
    处理器,用于从所述存储器中调用并运行所述指令,使得所述通信装置执行如权利要求18-20中任一所述的方法。
  27. 一种通信系统,其特征在于,包括如权利要求24所述的通信装置,以及包括数据处理节点,所述数据处理节点用于向所述通信装置发送第一指示。
  28. 如权利要求27所述的通信系统,其特征在于,包括通信装置,所述终端装置用于接收所述第一消息。
  29. 一种计算机可读存储介质,所述计算机存储介质中存储有指令,其特征在于,当所述指令在计算机上被调用执行时,使得计算机执行如权利要求1-16中任一所述的方法,或使得计算机执行如权利要求17所述的方法,或使得计算机执行如权利要求18-20中任一所述的方法。
  30. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上允许时,使得计算机执行如权利要求1-16中任一所述的方法,或使得计算机执行如权利要求17所 述的方法,或使得计算机执行如权利要求18-20中任一所述的方法。
  31. 一种芯片,其特征在于,所述芯片包括处理器,所述处理器与存储器耦合,所述芯片用于读取并执行所述存储器中存储的程序以执行如权利要求1-16中任一所述的方法,或执行如权利要求17所述的方法,或执行如权利要求18-20中任一所述的方法。
PCT/CN2020/096617 2019-06-17 2020-06-17 一种拥塞控制方法及装置 WO2020253735A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP20826742.7A EP3972332A4 (en) 2019-06-17 2020-06-17 OVERLOAD CONTROL METHOD AND DEVICE
AU2020295588A AU2020295588B2 (en) 2019-06-17 2020-06-17 Congestion control method and device
US17/554,242 US20220256396A1 (en) 2019-06-17 2021-12-17 Congestion control method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910520532.0 2019-06-17
CN201910520532.0A CN112105053B (zh) 2019-06-17 2019-06-17 一种拥塞控制方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/554,242 Continuation US20220256396A1 (en) 2019-06-17 2021-12-17 Congestion control method and apparatus

Publications (1)

Publication Number Publication Date
WO2020253735A1 true WO2020253735A1 (zh) 2020-12-24

Family

ID=73748351

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/096617 WO2020253735A1 (zh) 2019-06-17 2020-06-17 一种拥塞控制方法及装置

Country Status (5)

Country Link
US (1) US20220256396A1 (zh)
EP (1) EP3972332A4 (zh)
CN (1) CN112105053B (zh)
AU (1) AU2020295588B2 (zh)
WO (1) WO2020253735A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113114649B (zh) * 2021-04-02 2024-01-05 腾讯科技(深圳)有限公司 拒绝服务攻击的解决方法、装置、设备及介质
CN116419314A (zh) * 2021-12-31 2023-07-11 大唐移动通信设备有限公司 一种数据传输方法、装置、终端及网络设备
CN116436862A (zh) * 2021-12-31 2023-07-14 华为技术有限公司 一种通信方法及通信装置
CN117641441A (zh) * 2022-08-10 2024-03-01 华为技术有限公司 一种拥塞控制方法以及装置
CN118316878A (zh) * 2023-01-09 2024-07-09 中国移动通信有限公司研究院 一种网络拥塞控制方法及装置、通信设备
CN116155827B (zh) * 2023-01-17 2024-08-27 中国联合网络通信集团有限公司 数据传输方法、装置、路由器、电子设备和存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770885A (zh) * 2004-11-02 2006-05-10 华为技术有限公司 移动通信系统小区上行拥塞的处理方法
CN108738070A (zh) * 2017-04-20 2018-11-02 中兴通讯股份有限公司 一种控制网关用户面负荷的方法及系统
CN109548079A (zh) * 2017-09-22 2019-03-29 中兴通讯股份有限公司 一种指示通信系统的用户平面功能管理资源的方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123493B (zh) * 2008-03-26 2014-11-19 华为技术有限公司 分组数据网络连接的注册方法及装置
CN101925038B (zh) * 2009-06-12 2013-01-02 华为技术有限公司 数据传输方法、通信装置及网络系统
CN101711041B (zh) * 2009-12-09 2012-10-17 华为技术有限公司 拥塞控制方法、操作维护中心设备和基站
US9071985B2 (en) * 2012-02-01 2015-06-30 Qualcomm Incorporated Apparatus and method for user equipment assisted congestion control
KR102066130B1 (ko) * 2013-01-18 2020-02-11 삼성전자주식회사 무선 통신 시스템에서 트래픽 제어 방법 및 장치
US20140321271A1 (en) * 2013-04-24 2014-10-30 Telefonaktiebolaget L M Ericsson (Publ) Signal reduction based on radio load
KR102210906B1 (ko) * 2014-03-31 2021-02-02 콘비다 와이어리스, 엘엘씨 M2m 서비스 층과 3gpp 네트워크 사이의 과부하 제어 및 조율
CN105897608B (zh) * 2015-01-26 2020-03-13 中兴通讯股份有限公司 一种拥塞信息的管理方法和装置
RU2684487C1 (ru) * 2015-07-07 2019-04-09 Хуавей Текнолоджиз Ко., Лтд. Способ, устройство и система для обнаружения аномалии терминального устройства
US11317318B2 (en) * 2018-02-16 2022-04-26 Nec Corporation Distinguishing between general NAS level congestion and S-NSSAI related congestion control

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1770885A (zh) * 2004-11-02 2006-05-10 华为技术有限公司 移动通信系统小区上行拥塞的处理方法
CN108738070A (zh) * 2017-04-20 2018-11-02 中兴通讯股份有限公司 一种控制网关用户面负荷的方法及系统
CN109548079A (zh) * 2017-09-22 2019-03-29 中兴通讯股份有限公司 一种指示通信系统的用户平面功能管理资源的方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI; HISILICON; INTEL; INTERDIGITAL: "Congestion Control for CP Data Transport in 5GS", 3GPP DRAFT; C1-193312(REV OF 2744)_5G_CIOT_24.501_CONGESTION CONTROL-V4, vol. CT WG1, 6 May 2019 (2019-05-06), Reno (NV), USA, pages 1 - 28, XP051705935 *

Also Published As

Publication number Publication date
AU2020295588A1 (en) 2022-01-20
EP3972332A1 (en) 2022-03-23
CN112105053B (zh) 2022-04-22
US20220256396A1 (en) 2022-08-11
CN112105053A (zh) 2020-12-18
AU2020295588B2 (en) 2023-10-12
EP3972332A4 (en) 2022-06-22

Similar Documents

Publication Publication Date Title
WO2020253735A1 (zh) 一种拥塞控制方法及装置
EP3879879B1 (en) Time sensitive networking communication method and apparatus thereof
TWI817612B (zh) 通信方法和裝置
WO2021017550A1 (zh) 一种事件报告的发送方法、装置及系统
WO2020088598A1 (zh) 类别信息的确定方法及装置
EP3866506B1 (en) Method and device for controlling terminal and network connection
EP3687135B1 (en) Device monitoring, and deregistration method and apparatus
EP3920511B1 (en) Policy management method and device
US11824783B2 (en) Maximum data burst volume (MDBV) determining method, apparatus, and system
WO2022206252A1 (zh) 一种网络攻击的处理方法、装置、设备、计算机可读存储介质及计算机程序产品
CN110366204A (zh) 通信方法和通信装置
CN111131506A (zh) 报文处理方法及装置
WO2020156404A1 (zh) 一种上报终端能力的方法及装置
WO2023213177A1 (zh) 一种通信方法及装置
CN108810977B (zh) 一种通信方法、通信设备及具有存储功能的设备
WO2018133604A1 (zh) 接入控制方法、网元及用户设备和计算机存储介质
WO2021110021A1 (zh) 信息传输方法及通信设备
KR102318746B1 (ko) 가상 id를 이용하여 복수의 pdu 세션들을 처리하는 방법 및 상기 방법을 수행하는 smf
CN117528629A (zh) 通信方法、装置及系统
WO2023040728A1 (zh) 一种网元的选择方法、通信装置及通信系统
WO2023083153A1 (zh) 获取安全分级结果的方法及通信装置
WO2023041056A1 (zh) 网络验证的方法和装置
WO2024146315A1 (zh) 通信方法和通信装置
JP2024512630A (ja) 情報処理方法、装置及び通信機器
CN118741767A (zh) 通信方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20826742

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2020826742

Country of ref document: EP

Effective date: 20211217

ENP Entry into the national phase

Ref document number: 2020295588

Country of ref document: AU

Date of ref document: 20200617

Kind code of ref document: A