WO2021057794A1 - 配置业务的方法、通信装置和通信系统 - Google Patents
配置业务的方法、通信装置和通信系统 Download PDFInfo
- Publication number
- WO2021057794A1 WO2021057794A1 PCT/CN2020/117149 CN2020117149W WO2021057794A1 WO 2021057794 A1 WO2021057794 A1 WO 2021057794A1 CN 2020117149 W CN2020117149 W CN 2020117149W WO 2021057794 A1 WO2021057794 A1 WO 2021057794A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- policy
- request message
- network element
- service
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/20—Communication route or path selection, e.g. power-based or shortest path routing based on geographic position or location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
- H04W48/04—Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
Definitions
- This application relates to the field of communication, and more specifically, to a method, communication device, and communication system for configuring services.
- a user routing selection policy needs to support edge computing services.
- the edge computing business can be simply understood as the application function (AF) can choose to dynamically deploy application services at the edge.
- AF application function
- stadiums can deploy live broadcast/playback services during major events to realize the viewing angle of the audience in the stadium area.
- the service needs to guarantee large bandwidth and low delay, the service may only allow users in the adjacent area to access.
- the terminal device When accessing a specific service, the terminal device needs to select the correct protocol data unit (PDU) session configuration parameters according to the URSP rules in order to access the specific application service and obtain the corresponding service quality guarantee.
- PDU protocol data unit
- the present application provides a method, communication device, and communication system for configuring services, which can effectively configure URSP in a dynamic deployment scenario of application services and avoid unnecessary signaling overhead.
- a method for configuring a service including: an access management network element receives a first configuration request message from a network open network element, the first configuration request message includes first area information, and the first area information is used for In the indicated target area; if the target terminal device is located in the target area, the access management network element sends a user policy association request message to the policy control network element, and the user policy association request message is used to request the policy control network element to send
- the target terminal device configures a first user routing strategy URSP, and the first URSP is used for the target terminal device to access the first service; the access management network element receives the policy control network element And send the first URSP to the target terminal device.
- the policy control network element configures the first URSP for the target terminal device, so that the target terminal device can access the corresponding service according to the first URSP only when the target terminal device is in the target area. .
- the solution of the present application can effectively configure the URSP and avoid unnecessary signaling overhead.
- the first configuration request message and the user policy association request message both further include an application identifier, and the application identifier is used to indicate that the first service is provided Applications.
- the application identifier may be an application service provider (application service provider, ASP) identifier (identifier, ID), and the application service provider ASP indicated by the ASP ID provides the first service.
- the application identifier may be an application service identifier (AF Service Identifier), or may also be specific application identification information.
- the first configuration request message further includes one or more of the following: internal group identification, flow description information, time window information, internal affairs Identification, data network name (DNN), and single-network slice selection assistance information (S-NSSAI).
- the user policy association request message further includes one or more of the following: flow description information, time window information, the first area information, data network name DNN, and single network slice selection auxiliary information S- NSSAI.
- the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service; the flow description information is used to describe the first service; the time window information is used to indicate the first service The available time of a service; the internal transaction identifier is used to identify the configuration request of the first service; the DNN and the S-NSSAI are determined by the network open network element according to the application identifier.
- the access management network element can provide information for generating the first URSP, so that the policy control network element can generate the URSP according to the information provided by the access management network element.
- the first configuration request message and the user policy association request message both include an application identifier and an internal transaction identifier, or the first configuration request message and The user policy association request messages all include an internal transaction identifier, where the application identifier is used to indicate an application that provides the first service, and the internal transaction identifier is used to identify a configuration request of the first service. .
- the policy control network element can obtain information for generating URSP from the local or data storage network element based on the application identifier and internal transaction identifier, or based on the internal transaction identifier, and the policy control network element can generate information based on the acquired information. URSP.
- the access management network element may further The current location information of each terminal device being served is compared with the first area information to determine the terminal device in the target area.
- a method for configuring a service including: a policy control network element receives a user policy association request message from an access management network element, the user policy association request message includes an application identifier, and the application identifier is used To indicate the application of providing the first service; the policy control network element generates a first user routing policy URSP according to the user policy association request message, and the first URSP is used for the target terminal device to access the first service ; The policy control network element sends the first URSP to the target terminal device.
- the policy control network element may send the first URSP to the terminal device by accessing the management network element.
- the policy control network element configures the first URSP for the target terminal device, so that the target terminal device can access the corresponding service according to the first URSP only when the target terminal device is in the target area. .
- the solution of the present application can effectively configure the URSP and avoid unnecessary signaling overhead.
- the user policy association request message further includes one or more of the following: flow description information, time window information, first area information, data network The name DNN and the single network slice selection auxiliary information S-NSSAI.
- flow description information is used to describe the first service;
- the time window information is used to indicate the available time of the first service; the first area information is used to indicate the target area; the DNN and the S-NSSAI are determined according to the application identifier.
- a method for configuring a service including: a policy control network element obtains policy configuration information, the policy configuration information includes an application identifier, and the application identifier is used to indicate an application that provides a first service; the policy The control network element receives a user policy association request message from an access management network element, where the user policy association request message is used to request the policy control network element to configure a first user routing policy URSP to a target terminal device, and the first A URSP is used for a target terminal device to access the first service, and the target terminal device is located in a target area; the policy control network element generates the first URSP according to the policy configuration information; the policy control network element Sending the first URSP to the target terminal device.
- the policy control network element may send the first URSP to the terminal device by accessing the management network element.
- the policy control network element can obtain policy configuration information, and when the target terminal device is located in the target area, configure the first URSP to the target terminal device according to the policy configuration information, so that the target terminal device is only in the target area At this time, the corresponding service can be accessed according to the first URSP.
- the solution of the present application can effectively configure the URSP and avoid unnecessary signaling overhead.
- the policy control network element acquiring policy configuration information includes: the policy control network element receives a policy configuration request message from a network open network element, and the policy configuration The request message includes the policy configuration information; or, the policy control network element obtains the policy configuration information from a data storage network element.
- the policy configuration information is sent by the network opening network element to the data storage network element.
- the network open network element can configure the policy configuration information to the policy control network element; or the network open network element can configure the policy configuration information to the data storage network element, and the policy control network element can obtain it from the data storage network element The policy configuration information.
- the policy configuration information further includes one or more of the following: internal group identification, flow description information, time window information, internal transaction identification, First area information, data network name DNN, and single network slice selection auxiliary information S-NSSAI.
- the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service; the flow description information is used to describe the first service; the time window information is used to indicate the first service The available time of a service; the internal transaction identifier is used to identify the configuration request of the first service; the first area information is used to indicate a target area, and the target area is to allow the target terminal device to access the The area of the first service; the DNN and the S-NSSAI are determined according to the application identifier.
- the user policy association request message includes the application identifier and/or internal transaction identifier, and the internal transaction identifier is used to identify the configuration of the first service request.
- a method for configuring a service including: a policy control network element obtains policy configuration information, the policy configuration information includes first area information and an application identifier, and the first area information is used to indicate a target area, The application identifier is used to indicate the application that provides the first service; the policy control network element receives the location indication information from the access management network element; the policy control network element determines the target terminal according to the location indication information The device is located in the target area, and generates a first user routing policy URSP according to the policy configuration information; the policy control network element sends the first URSP to the target terminal device, and the first URSP is used for all The target terminal device accesses the first service.
- the location indication information is used to indicate the current location of the target terminal device, or the location indication information is used to indicate that the target terminal device enters or leaves the target area.
- the access management network element may send the first URSP to the terminal device through the access management network element.
- the policy control network element can configure the first URSP to the target terminal device according to the policy configuration information when the target terminal device is in the target area, so that the target terminal device can only be based on the first URSP when the target terminal device is in the target area.
- URSP accesses the corresponding business.
- the policy configuration information further includes one or more of the following: internal group identification, flow description information, time window information, internal transaction identification, Data network name DNN and single network slice selection auxiliary information S-NSSAI.
- the internal group identifier is used to indicate all target terminal devices that are allowed to access the first service;
- the flow description information is used to describe the first service;
- the time window information is used to indicate all target terminal devices The available time of the first service;
- the internal transaction identifier is used to identify the configuration request of the first service;
- the DNN and the S-NSSAI are determined according to the application identifier.
- the policy control network element acquiring policy configuration information includes: the policy control network element receives a first configuration request message from a network opening network element, and the first configuration request message A configuration request message includes the policy configuration information; or, the policy control network element obtains the policy configuration information from a data storage network element.
- the policy configuration information is sent by the network opening network element to the data storage network element.
- the location indication information is used to indicate the current location of the target terminal device; wherein, the policy control network element receives the location indication from the access management network element
- the information includes: the policy control network element receives a policy control request message from the access management network element, the policy control request message includes the location indication information, and the policy control request message is a policy control establishment request message or Policy control update request message.
- the location indication information is used to instruct the target terminal device to enter or leave the target area; and, in the policy control network element from the access management Before the network element receives the location indication information, the method further includes: the policy control network element sends an event subscription request message to the access management network element, where the event subscription request message is used to indicate that the target terminal device is entering Or when leaving the target area, send location indication information to the policy control network element.
- a method for configuring a service including: applying a network element to generate a second configuration request message, the second configuration request message including an application identifier and second area information, and the application identifier is used to instruct to provide the second configuration request message.
- a service application the second area information is used to indicate a target area, and the second service configuration request message is used to configure a target terminal device to access the first service when in the target area; the application network element Sending the second configuration request message to the network open network element.
- the application network element performs the first service configuration on the network open network element, so that the network open network element can send the relevant configuration to the policy control network element or the access management network element or the data storage network element, so that The policy control network element may configure the first URSP to the target terminal device according to the policy configuration information when the target terminal device is in the target area.
- the second configuration request message further includes one or more of the following: external group identification, flow description information, time window information, and external transaction identification.
- the external group identifier is used to indicate multiple terminal devices that are allowed to access the first service, and the target terminal device is any one of the multiple terminal devices;
- the flow description information is used for To describe the service flow of the first service;
- the time window information is used to indicate the available time of the first service;
- the external transaction identifier is used to identify the second service configuration request message.
- a method for configuring a service including: a network opening network element receives a second configuration request message from an application network element, the second configuration request message including an application identifier and second area information, the application identifier It is used to indicate an application that provides the first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure the target terminal device to access the first service when in the target area.
- the network opening network element generates a first configuration request message according to the second configuration request message, and sends the first configuration request message to the access management network element, where the first configuration request message includes The first area information and the application identifier, the first area information is used to indicate the target area, and the first area information is determined according to the second area information.
- the access management network element can request the first URSP from the policy control network element when the target terminal device is located in the target area according to the first configuration request message sent by the network opening network element.
- the policy control network element can configure the first URSP to the target terminal device when the target terminal device is in the target area, so that the target terminal device can access the first service when the target terminal device is in the target area.
- the second configuration request message further includes one or more of the following: external group identification, flow description information, time window information, and external transaction identification.
- the first configuration request message further includes one or more of the following: internal group identification, flow description information, time window information, internal transaction identification, data network name DNN, and single network slice selection auxiliary information S -NSSAI.
- the external group identifier and the internal group identifier are both used to indicate that access to all target terminal devices of the first service is allowed, and the internal group identifier is determined according to the external group identifier;
- the flow description information is used to describe the service flow of the first service;
- the time window information is used to indicate the available time of the first service;
- the external transaction identifier is used to identify the second configuration request message, so
- the internal transaction identifier is used to identify the first configuration request message, and the internal transaction identifier is determined according to the external transaction identifier.
- a method for configuring a service including: a network open network element receives a second configuration request message from an application network element, the second configuration request message includes an application identifier and second area information, the application identifier It is used to indicate an application that provides the first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure the target terminal device to access the first service when in the target area. Then, the network opening network element generates a first configuration request message and a policy configuration request message according to the second configuration request message, and sends a policy configuration request message to the policy control network element or the data storage network element, and sends the policy configuration request message to the access management network element. The network element sends the first configuration request message, the first configuration request message includes the first area information, and the policy configuration request message includes an application identifier.
- the access management network element can request the first URSP from the policy control network element when the target terminal device is located in the target area according to the first configuration request message sent by the network opening network element.
- the policy control network element can generate and configure the first URSP to the target terminal device according to the policy configuration request message when the target terminal device is in the target area, so that the target terminal device can access the first service when in the target area.
- the second configuration request message further includes one or more of the following: external group identification, flow description information, time window information, and external transaction identification.
- the first configuration request message and/or the policy configuration request message further includes one or more of the following: internal group identification, flow description information, time window information, internal transaction identification, data network name DNN and a single network slice select auxiliary information S-NSSAI.
- the external group identifier and the internal group identifier are both used to indicate that access to all target terminal devices of the first service is allowed, and the internal group identifier is determined according to the external group identifier;
- the flow description information is used to describe the service flow of the first service;
- the time window information is used to indicate the available time of the first service;
- the external transaction identifier is used to identify the second configuration request message, so
- the internal transaction identifier is used to identify the first configuration request message, and the internal transaction identifier is determined according to the external transaction identifier.
- a method for configuring a service including: a network opening network element receives a second configuration request message from an application network element, the second configuration request message including an application identifier and second area information, the application identifier It is used to indicate an application that provides the first service, the second area information is used to indicate a target area, and the second configuration request message is used to configure the target terminal device to access the first service when in the target area. Then, the network opening network element generates a policy configuration request message according to the second configuration request message, and sends the policy configuration request message to the policy control network element.
- the policy configuration request message includes the first area information and the application identifier.
- the policy control network element can generate and configure the first URSP to the target terminal device according to the policy configuration request message when the target terminal device is in the target area, so that the target terminal device can access the first URSP when the target terminal device is in the target area.
- the second configuration request message further includes one or more of the following: external group identification, flow description information, time window information, and external transaction identification.
- the policy configuration request message further includes one or more of the following: internal group identification, flow description information, time window information, internal transaction identification, data network name DNN, and single network slice selection auxiliary information S- NSSAI.
- the external group identifier and the internal group identifier are both used to indicate that access to all target terminal devices of the first service is allowed, and the internal group identifier is determined according to the external group identifier;
- the flow description information is used to describe the service flow of the first service;
- the time window information is used to indicate the available time of the first service;
- the external transaction identifier is used to identify the second configuration request message, so
- the internal transaction identifier is used to identify the first configuration request message, and the internal transaction identifier is determined according to the external transaction identifier.
- a communication device which includes various modules or units for executing the method in any one of the first aspect to the eighth aspect and the first aspect or the eighth aspect.
- a communication device including a processor.
- the processor is coupled to the memory and can be used to execute instructions in the memory to implement the method in any one of the foregoing first aspect to the eighth aspect and any one of the first aspect to the eighth aspect.
- the communication device further includes a memory.
- the communication device further includes a communication interface, and the processor is coupled with the communication interface.
- a processor including: an input circuit, an output circuit, and a processing circuit.
- the processing circuit is configured to receive a signal through the input circuit and transmit a signal through the output circuit, so that the processor executes any one of the first aspect to the eighth aspect and the first aspect to the eighth aspect. The method in the way.
- the above-mentioned processor can be one or more chips
- the input circuit can be an input pin
- the output circuit can be an output pin
- the processing circuit can be a transistor, a gate circuit, a flip-flop, and various logic circuits, etc.
- the input signal received by the input circuit may be received and input by, for example, but not limited to, a receiver
- the signal output by the output circuit may be, for example, but not limited to, output to the transmitter and transmitted by the transmitter
- the circuit can be the same circuit, which is used as an input circuit and an output circuit at different times.
- the embodiments of the present application do not limit the specific implementation manners of the processor and various circuits.
- a processing device including a processor and a memory.
- the processor is used to read instructions stored in the memory, receive signals through a receiver, and transmit signals through a transmitter to execute any one of the first to eighth aspects and any one of the possible implementation manners of the first to eighth aspects In the method.
- processors there are one or more processors and one or more memories.
- the memory may be integrated with the processor, or the memory and the processor may be provided separately.
- the memory can be a non-transitory (non-transitory) memory, such as a read only memory (ROM), which can be integrated with the processor on the same chip, or can be set in different On the chip, the embodiment of the present application does not limit the type of the memory and the setting mode of the memory and the processor.
- ROM read only memory
- the processing device in the above-mentioned twelfth aspect may be one or more chips.
- the processor in the processing device can be implemented by hardware or software.
- the processor may be a logic circuit, integrated circuit, etc.; when implemented by software, the processor may be a general-purpose processor, which is implemented by reading the software code stored in the memory, and the memory may Integrated in the processor, can be located outside the processor, and exist independently.
- a computer program product includes: a computer program (also called code, or instruction), which when the computer program is run, causes the computer to execute the first aspect to The eighth aspect and the method in any one of the possible implementation manners of the first to eighth aspects.
- a computer program also called code, or instruction
- a computer-readable storage medium stores a computer program (also called code, or instruction) when it runs on a computer, so that the computer executes the above-mentioned first aspect To the eighth aspect and the method in any one of the possible implementation manners of the first to the eighth aspect.
- a computer program also called code, or instruction
- a communication system including at least two of the aforementioned policy control network element, access management network element, data storage network element, application network element, and network open network element.
- the communication system may also include the aforementioned target terminal device.
- Figure 1 is a schematic block diagram of the system architecture
- FIG. 2 is a schematic flowchart of a method for configuring services provided by the present application
- FIG. 3 is a schematic flowchart of a specific example of a method for configuring a service provided by the present application
- FIG. 4 is a schematic flowchart of another specific example of a method for configuring a service provided by the present application
- FIG. 5 is a schematic flowchart of another specific example of a method for configuring a service provided by the present application
- FIG. 6 is a schematic flowchart of another method for configuring services provided by the present application.
- Fig. 7 is a schematic block diagram of a communication device provided by the present application.
- Fig. 8 is a schematic block diagram of a terminal device provided by the present application.
- Fig. 9 is a schematic block diagram of another communication device provided by the present application.
- the technical solutions of the embodiments of the present application may be applied to a fifth generation (5G) system or a new radio (NR) communication system, and may also be applied to other communication systems that may appear in the future, such as a 6G communication system. .
- 5G fifth generation
- NR new radio
- FIG. 1 is a schematic diagram of the 5G system architecture.
- the system architecture may include user equipment (UE) 101, radio access network (RAN) network element 102, policy control function (policy control function) 103, data network (data network, DN) 104, access and mobility management function (AMF) 105, session management function (SMF) 106, policy control function (PCF) 107, application function (application function, AF) 108, unified data management (unified data management, UDM) 109, unified data warehouse (unified data repository, UDR) 110, and network exposure function (network exposure function, NEF) 111.
- UE user equipment
- RAN radio access network
- policy control function policy control function
- data network data network
- DN data network
- AMF access and mobility management function
- SMF session management function
- PCF policy control function
- application function application function, AF
- UDM unified data management
- UDR unified data warehouse
- NEF network exposure function
- the terminal device can communicate with one or more core networks (core networks, CN) via RAN network elements.
- the terminal device can be called an access terminal, terminal, user unit, user station, mobile station, mobile station, remote station, remote terminal, mobile device, user terminal, wireless network device, user agent, or user device.
- the terminal can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), a handheld with wireless communication function Devices, computing devices or other devices connected to wireless modems, in-vehicle devices, wearable devices or the Internet of Things, terminal devices in vehicle networks, and terminal devices of any form in future networks, etc.
- SIP session initiation protocol
- WLL wireless local loop
- PDA personal digital assistant
- the RAN network element It is a device that connects the UE to the wireless network.
- the RAN network element can be a base station NodeB, an evolved base station (evloved NodeB, eNB), a next generation base station (gNB) in a 5G mobile communication system, a transmission point, a base station in a future mobile communication system, or wireless fidelity ( One or a group (including multiple antenna panels) antenna panels of an access node in a wireless fidelity system or a base station in a 5G system.
- eNB evolved base station
- gNB next generation base station
- wireless fidelity One or a group (including multiple antenna panels) antenna panels of an access node in a wireless fidelity system or a base station in a 5G system.
- the radio access network device may also be a network node that constitutes a gNB or transmission point, such as a baseband unit (BBU), or a distributed unit (DU), or a centralized unit (centralized unit, CU), or, centralized unit control plane (CU-CP) and centralized unit user plane (CU-UP), etc.
- BBU baseband unit
- DU distributed unit
- CU centralized unit
- CU-CP centralized unit control plane
- CU-UP centralized unit user plane
- the embodiment of the present application does not limit the specific technology and specific device form adopted by the radio access network device.
- gNB may include CU and DU.
- One CU can be connected to one DU, or multiple DUs can share one CU, which can save costs and facilitate network expansion.
- the CU implements some of the functions of the gNB, and the DU implements some of the functions of the gNB.
- the CU is responsible for processing non-real-time protocols and services to realize the functions of the radio resource control (RRC) layer and the packet data convergence protocol (PDCP) layer.
- the DU is responsible for processing physical layer protocols and real-time services to implement the functions of the radio link control (RLC) layer, media access control (MAC) layer, and physical (PHY) layer.
- RLC radio link control
- MAC media access control
- PHY physical
- the CU and DU are connected through the F1 interface.
- CU stands for gNB to connect to the core network through the Ng interface.
- the centralized unit CU can also be divided into a control plane (CU-CP) and a user plane (CU-UP).
- CU-CP is responsible for the control plane function, mainly including RRC and packet data convergence protocol control plane (packet data convergence protocol control, PDCP-C).
- PDCP-C packet data convergence protocol control
- PDCP-C packet data convergence protocol control
- PDCP-C is mainly responsible for at least one function such as encryption and decryption of control plane data, integrity protection, and data transmission.
- CU-UP is responsible for the user plane function, and mainly includes service data adaptation protocol (SDAP) and packet data convergence protocol user plane (packet data convergence protocol user, PDCP-U).
- SDAP service data adaptation protocol
- PDCP-U packet data convergence protocol user
- SDAP is mainly responsible for processing the data of the core network and mapping the flow to the bearer.
- PDCP-U is mainly responsible for at least one function of data plane encryption and decryption, integrity protection, header compression, serial number maintenance, and data transmission.
- CU-CP and CU-UP are connected through the E1 interface.
- CU-CP represents that gNB is connected to the core network through the Ng interface.
- CU-UP is connected to DU through F1-U (user plane).
- F1-C control plane
- F1-U user plane
- PDCP-C is also in CU-UP.
- the gNB may also include an active antenna unit (AAU).
- AAU realizes some physical layer processing functions, radio frequency processing and related functions of active antennas. Since the information of the RRC layer will eventually become the information of the PHY layer, or be transformed from the information of the PHY layer, under this architecture, high-level signaling, such as RRC layer signaling, can also be considered to be sent by the DU , Or, sent by DU+AAU.
- the network device may be a device including one or more of a CU node, a DU node, a CU-CP node, a CU-UP node, and an AAU node.
- the CU may be used as a network device in an access network, or as a network device in a core network (core network, CN), which is not limited in this application.
- UPF It is a user plane network element used for packet routing and forwarding, quality of service (QoS) processing of user plane data, packet detection and policy rule execution, etc.
- QoS quality of service
- DN used to provide data transmission network, for example, Internet network, etc.
- the DN can be data network authentication, authorization, and accounting (data network authentication, authorization, accounting), and can also be an application server (application function, AF), etc.
- AF An application network element that mainly conveys the requirements of the application side on the network side, for example, quality of service (QoS) requirements.
- QoS quality of service
- AF can be a third-party functional entity, or an application service deployed by an operator, such as an IP Multimedia Subsystem (IMS) voice call service.
- IMS IP Multimedia Subsystem
- AMF an access management network element, which is mainly used for session management, UE's Internet Protocol (IP) address allocation and management, selection of manageable UPF network elements, and access network-related implementation through AMF
- IP Internet Protocol
- NEF A network open network element used to safely open services and capabilities provided by 3GPP network functions to the outside.
- NRF A network storage network element used to store network functional entities and description information of the services they provide, as well as to support service discovery and network element entity discovery.
- PCF a policy control network element, a unified policy framework used to guide network behavior, and provide policy rule information for control plane function network elements (such as AMF, SMF network elements, etc.).
- UDM A data management network element used to implement functions such as processing user identification, access authentication, registration, and mobility management.
- UDR A data storage network element, which is mainly responsible for the access function of contract data, policy data, application data and other types of data.
- network elements may be hardware devices, chips, or software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform). It should also be understood that some network elements shown in FIG. 1 may be deployed in the same location (for example, on the same hardware device or software function), or may be deployed separately, which is not limited in this application.
- the interfaces between the network elements shown in Figure 1 are only an example. In practice, the interfaces between the network elements may be changed. For example, the network elements can communicate with each other using a service interface. .
- the management network element is named AMF in the 5G system, but may not be AMF in the 6G system.
- AMF Access Management network element
- the access management network element is AMF
- the network opening network element is NEF
- the policy control network element is PCF
- the application network element is AF
- the data storage network element is UDR as examples. Be explained.
- URSP needs to support edge computing services.
- the edge computing business can be simply understood as that AF can choose to dynamically deploy application services at the edge.
- stadiums can deploy live broadcast/playback services during major events to achieve functions such as switching viewing angles and replaying highlights in the stadium area. Improve user viewing experience.
- the service needs to guarantee large bandwidth and low delay, the service may only allow users in the adjacent area to access.
- the terminal device When accessing a specific service, the terminal device needs to select the correct PDU session configuration parameters according to the URSP rules, such as DNN, S-NSSAI and other information, in order to access the specific application service and obtain the corresponding service quality guarantee.
- the URSP rules such as DNN, S-NSSAI and other information
- this application proposes a method for configuring services.
- the following describes the solution provided by this application. It should be understood that the execution order of the method provided in the present application is only determined by the internal logic of the method, and is not limited by the reference numerals in the drawings corresponding to each embodiment.
- Fig. 2 is a schematic flowchart of a method for configuring a service provided by the present application. As shown in FIG. 2, the method 200 may include S210 to S260. Each step is explained separately below.
- S210 The AMF determines whether the target UE is located in the target area according to the first area information.
- the first area information is used to indicate the target area.
- the first area information can be configured to the AMF by the AF through the NEF.
- the target UE may be any UE in the network, or some specific UEs, and these specific UEs may be configured by the AF to the AMF through the NEF.
- the user policy association request message is used to request the PCF to configure the first URSP for the target UE, and the first URSP is used for the target UE to access the first service.
- the user policy association request message may be a user policy association establishment request message or a user policy association update request message.
- the target UE being located in the target area may mean that the target UE has entered the target area or the target UE is already located in the target area.
- S230 The PCF generates a first URSP.
- the PCF may generate the first URSP according to the application identifier, where the application indicated by the application identifier provides the first service, or the application identifier is used to indicate the application that provides the first service.
- the application identifier may be an application service provider (application service provider, ASP) identifier (identifier, ID), and the application service provider ASP indicated by the ASP ID provides the first service.
- the application identifier may be an application service identifier (AF Service Identifier), or may also be specific application identification information.
- ASP ID is used instead of application identification to describe.
- the first URSP may include flow description (traffic descriptor, TD) information and route selection description (route selection descriptor) information.
- flow description traffic descriptor, TD
- route selection description route selection descriptor
- the flow description information is used to describe the service flow of the first service, which can be the APP ID or IP triplet (destination address, destination port number, protocol type) corresponding to the first service, or domain name description information, etc.
- the format can refer to the stream description format in the prior art URSP.
- the aforementioned application ID can be understood as an application ID with a consistent concept between the operator and the ASP; and here, the APP ID can be understood as an application ID with a consistent concept between the UE and the operator.
- the APP ID can be the A certain sub-application provided by ASP.
- the routing description information can include one or more of the following:
- Time window (TW) information The time window information can be regarded as the time verification condition of the routing description information, which is used to indicate the effective time of the routing description information, that is, the routing description information is considered valid only within the time window.
- the area information can be regarded as the location verification condition of the routing description information, which is used to indicate the effective location of the routing description information, that is, the routing description information is considered valid only in the area.
- DNN and S-NSSAI can be obtained by NEF according to ASP ID and local operator configuration information, or by PCF according to ASP ID and/or flow description information and local operator configuration information or UDR configuration information.
- the user policy association request message may include the ASP ID.
- the user policy association request message may also include one or more of the following: flow description information, time window information, first area information, DNN, and S-NSSAI. That is to say, any one of ASP ID and flow description information, time window information, first area information, DNN, and S-NSSAI can be provided by AMF.
- PCF can also determine DNN and S-NSSAI based on ASP ID and/or flow description information, local operator configuration information or configuration information in UDR.
- the PCF can obtain the ASP ID from the local or UDR.
- the PCF may also obtain flow description information and/or time window information from the local or UDR, and may obtain the first area information from the local or UDR or AMF.
- the above information in the PCF and the above information in the UDR are configured by the AF through the NEF.
- the NEF can map the ASP ID according to the local operator configuration information to obtain the DNN and S-NSSAI, so that the PCF can also obtain the DNN and S-NSSAI from the NEF. If NEF does not perform the mapping action from ASP ID to DNN and S-NSSAI, PCF can obtain DNN and N-SSAI according to ASP ID and/or flow description information and local operator configuration information or configuration information in UDR.
- the AMF sends a user policy association request message to the PCF. That is, if the target UE is located in the target area outside the time window indicated by the time window information, the AMF may not send the user policy association request message to the PCF. Then correspondingly, in S230, the PCF does not need to determine whether the time when the AMF sends the user policy association request message is within the time window.
- the AMF may send a user policy association request message to the PCF.
- the PCF may determine whether to perform S230 according to the time when the user policy association request message is received. If the PCF receives the user policy association request message within the time window indicated by the time window information, S230 is executed; otherwise, S230 is not executed. In addition, the PCF may not determine whether the time when the AMF sends the user policy association request message is within the time window, and the UE determines whether the first URSP policy is currently executed according to the time window information in the URSP policy.
- S240 The PCF sends the first URSP to the AMF.
- the AMF sends the first URSP to the target UE.
- the PCF may send the first URSP to the UE via the AMF through the UE Configuration Update (UE Configuration Update) procedure.
- UE Configuration Update UE Configuration Update
- S260 The target UE accesses the first service according to the first URSP.
- the target UE after receiving the first URSP, the target UE will execute the URSP matching process when initiating the first service corresponding to the first URSP, and match the first URSP according to the flow description information corresponding to the first service Then, according to the routing description information in the matched first URSP, a PDU session establishment process or a PDU session modification process is initiated.
- the PCF configures the first URSP for the UE, so that the target UE can access the corresponding service according to the first URSP only when the target UE is in the target area.
- the solution of the present application can effectively configure the URSP and avoid unnecessary signaling overhead.
- FIG. 2 The method shown in FIG. 2 will be described in more detail below in conjunction with the detailed flowcharts shown in FIG. 3 to FIG. 5.
- the AMF determines that the target UE is located in the target area, it provides the PCF with information for generating the first URSP.
- NEF notifies the PCF of the information used to generate the first URSP; in the method shown in Figure 5, NEF will be used to generate the first URSP.
- the URSP information is notified to the UDR, and the UDR provides it to the PCF.
- the method shown in FIG. 3 may correspond to the first manner described in S230, and the methods shown in FIG. 4 and FIG. 5 may correspond to the second manner described in S230.
- Fig. 3 is a schematic flowchart of a method for configuring a service. As shown in FIG. 3, the method 300 may include part or all of the steps in S301 to S314. Each step is explained separately below.
- the AF sends a second configuration request message to the NEF.
- AF can send a second configuration request message when a new application is deployed, such as deploying a virtual reality (VR) experience venue to newly deploy a VR experience service, and by sending a second configuration request message to allow users in the museum to pass Mobile phone access and use.
- a new application such as deploying a virtual reality (VR) experience venue to newly deploy a VR experience service
- a second configuration request message to allow users in the museum to pass Mobile phone access and use.
- the service needs to be accessed through a specific DNN/S-NSSAI, that is, AF needs to inform the operator to configure the corresponding URSP to the target user before the user accesses the experience service.
- the AF may send the second configuration request message when the ASP adds an application access point to a specific local access data network (LADN).
- LADN local access data network
- the ASP adds an application access point to a specific LADN, allowing the UE to access the application service through the local branch to reduce the user plane path loopback.
- the ASP can provide the LADN information to the UE through the URSP of the operator network so that the UE can pass The correct LADN network accesses the application service.
- the second service configuration request message is used to configure the target UE to access the first service when the target UE is in the target area.
- the second service configuration request message may include the above-mentioned ASP ID and information used to indicate the target area (denoted as second area information in this application).
- the second area information may be external geographic area information (Geo Info), but this application does not limit it.
- the second configuration request message may also carry an external group identifier, and the external group identifier is used to indicate all target UEs that are allowed to access the first service.
- the target UE may be any UE in the network.
- the second configuration request message may also include one or more of the following:
- the external transaction identifier is used to uniquely identify the configuration request of the first service, so that the external transaction identifier is subsequently sent to the NEF to request to update or cancel the configuration request of the first service.
- the configuration request of the first service that is, the configuration information related to the first service or the configuration request message related to the first service.
- S302 The NEF performs the first service configuration authorization according to the second configuration request message.
- NEF judges according to the ASP ID whether the ASP indicated by the ASP ID is allowed to send the configuration request for the first service (that is, the first configuration request message), and if it is allowed, the second area information is mapped to the following One or more items: internal location information in the operator's network, cell identification list (List of Cell id(s)), RAN equipment list (List of gNodeB(s)), and tracking area identifier (TAI) List (List of TAI(s)).
- the above-mentioned information obtained by mapping the second area information can be collectively referred to as: the first area information. It is easy to understand that the area indicated by the first area information and the area indicated by the second area information are the same, that is, both are target areas.
- the NEF may also map the external group identifier to an internal group identifier (IGI). It should be understood that the external group identifier is the same as the UE indicated by the internal group identifier.
- IGI internal group identifier
- the NEF may also map the external transaction identifier to an internal transaction identifier (ITI).
- ITI internal transaction identifier
- NEF can also map ASP ID to DNN and S-NSSAI according to the operator configuration information.
- the NEF obtains AMF identification information (or AMF set information) that provides services for the target area.
- the NEF may map the AMF identification information according to the second area information.
- NEF can send the first area information to UDM, and UDM can determine the AMF identification information that provides services in the area based on the mapping relationship between the first area information and the AMF identifier, and then UDM can identify the AMF The information is sent to NEF.
- the NEF sends a first configuration request message to the AMF identified by the AMF identification information.
- the first configuration request message includes ASP ID and first area information.
- the first configuration request message may also include the flow description information.
- the first configuration request message may also include time window information.
- the first configuration request message may also include the time window information.
- the second configuration request message includes an external transaction identifier
- the first configuration request message may also include an internal transaction identifier.
- the second configuration request message includes the external group identifier, the first configuration request message may also include the internal group identifier.
- the first configuration request message may also include DNN and S-NSSAI.
- the NEF may be an intermediate NEF (Intermediate NEF, I-NEF) deployed by the visited network, or the NEF of the home network. If the NEF is an I-NEF deployed by the visited network, the process is basically the same as the non-roaming scenario. If the NEF is the NEF of the home network, after the NEF sends the second configuration request message, the second configuration request message is forwarded to the AMF of the visited network via the I-NEF.
- I-NEF Intermediate NEF
- the AMF saves the received first configuration request message.
- the AMF sends a first response message to the NEF.
- the first response message is used to indicate that the AMF successfully receives the first configuration request message.
- the NEF sends a second response message to the AF.
- the second response message is used to indicate that the NEF successfully receives the second configuration request message.
- 306 and S307 are optional steps.
- the execution order of S306 and S307 is also not limited.
- S307 can also be executed before S302 or S303.
- S308 The AMF judges whether the target UE is located in the target area.
- the AMF compares the current location information of the served target UE with the first area information in the first configuration request message. If a target UE is located in the target area, the AMF will initiate S309 to S314 for the target UE. The process is shown, otherwise the process is not initiated.
- the AMF may also initiate S309 to S314 for the target UE when it determines that the target UE is located in the target area within the time window indicated by the time window information
- the AMF when the AMF receives a handover request or registration request message from the target UE before the end of the time window indicated by the time window information, if it is determined that the target UE has entered the target area, the AMF initiates the target UE in the procedures shown in S309 to S314 . It should be understood that the handover request or registration request received by the AMF will carry current location information of the target UE, such as RAN device list/TAI information.
- the AMF stores the current RAN equipment or TAI information of the UE it serves.
- S309 The AMF sends a user policy association request message to the PCF.
- the user policy association request message may include the ASP ID.
- the user policy association request message may also include one or more of the following: flow description information; time window information; first area information; internal transaction identification; DNN and S-NSSAI.
- S309 is specifically: the AMF sends a user policy association request message to the V-PCF.
- S309 is specifically: the AMF sends a user policy association request message to the V-PCF, and then the V-PCF forwards the user policy association request message to the H-PCF.
- the PCF in the subsequent steps may be V-PCF or H-PCF accordingly.
- S310 The PCF sends a third response message to the AMF.
- the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S310 is an optional step.
- S311 The PCF generates a first URSP according to the user policy association request message.
- S312 to S314 are the same as S240 to S260, and you can refer to S240 to S260.
- the AF sends the configuration request related to the first service to the AMF via the NEF, and the AMF initiates a user policy association request to the PCF for the target UE entering the target area according to the configuration request, so that the PCF can update the target UE in time
- the URSP provides network guarantee for the target UE to access the deployed applications in the target area.
- Fig. 4 is a schematic flowchart of a method for configuring a service. As shown in FIG. 4, the method 400 may include part or all of the steps in S401 to S417. Each step is explained separately below.
- S401 to S402 are the same as S301 to S302, and you can refer to S301 to S302.
- S403 The NEF sends a policy configuration request message to the PCF.
- the policy configuration request message may include the ASP ID.
- the policy configuration request message may also include one or more of the following: flow description information; time window information; first area information; internal transaction identifier; DNN and S-NSSAI.
- the policy configuration request message may only be sent to the PCF node in the current network (the I-NEF is sent to the PCF node in the visited network in the roaming scenario, and the NEF is sent to the PCF node in the home network in the non-roaming scenario).
- policy configuration information refers to the content included in the policy configuration request message.
- S405 The PCF sends a fourth response message to the NEF.
- the fourth response message is used to indicate that the PCF successfully receives the policy configuration request message.
- S406 is the same as S303, and you can refer to S303.
- the NEF sends a first configuration request message to the AMF identified by the AMF identification information.
- Step S407 is similar to S304, except that in S407, the first configuration request message may include the first area information.
- the first configuration request message may also include one or more of the following: ASP ID; flow description information; time window information; internal transaction identification; DNN and S-NSSAI.
- the first configuration request message may include the ASP ID, or the first configuration request message may include the internal transaction identifier, or both the ASP ID and the internal transaction identifier.
- S408 to S410 are the same as S305 to S307, and you can refer to S305 to S307.
- S411 The AMF judges whether the target UE is located in the target area.
- the AMF compares the current location information of the served target UE with the first area information in the first configuration request message. If a target UE is located in the target area, the AMF will initiate S412 to S417 for the target UE. Otherwise, the process will not be initiated.
- the first configuration request message further includes time window information
- the AMF determines that the target UE is located in the target area within the time window indicated by the time window information, and then initiates S412 to S417 for the target UE.
- the AMF when the AMF receives a handover request or registration request message from the target UE before the end of the time window indicated by the time window information, if it is determined that the target UE has entered the target area, the AMF initiates the target UE in the procedures shown in S412 to S417 . It should be understood that the handover request or registration request received by the AMF will carry current location information of the target UE, such as RAN equipment information and/or TAI information.
- the AMF stores the RAN equipment information and/or TAI information where the UE it serves currently is located.
- S412 The AMF sends a user policy association request message to the PCF.
- the user policy association request message may include internal transaction identification and/or ASP ID.
- the PCF can obtain the policy configuration information from locally stored information according to the internal transaction identifier and/or ASP ID, so that it can execute the URSP decision based on the policy configuration information and the local operator configuration information to generate the first URSP . It should be understood that if the PCF obtains the policy configuration information according to the internal transaction identifier, the policy configuration information also includes the internal transaction identifier.
- the user policy association request message may further include one or more of the following: time window information; first area information; internal transaction identifier; DNN and S-NSSAI.
- S412 is specifically: the AMF sends a user policy association request message to the V-PCF.
- S412 specifically includes: the AMF sends a user policy association request message to the V-PCF, and then the V-PCF forwards the user policy association request message to the H-PCF.
- the PCF in the subsequent steps may be V-PCF or H-PCF accordingly.
- the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S413 is an optional step.
- S414 The PCF generates a first URSP according to the user policy association request message and the stored policy configuration information.
- S415 to S417 are the same as S240 to S260, and you can refer to S240 to S260.
- AF sends URSP decisions to specific PCF nodes in the operator's network (or all PCF nodes in the network, or PCF nodes that support access and mobility policy decisions) via NEF.
- Information ie, policy configuration information
- the AMF issues a service-related configuration request to the AMF
- the AMF initiates a user policy association request to the PCF for the target UE entering the target area according to the configuration request, so that the PCF can update the URSP on the target UE in time, Provide network guarantee for the target UE to access the deployed application in the target area.
- Fig. 5 is a schematic flowchart of a method for configuring a service. As shown in FIG. 5, the method 500 may include part or all of the steps in S501 to S518. Each step is explained separately below.
- S501 to S502 are the same as S301 to S302, and you can refer to S301 to S302.
- S503 The NEF sends a policy configuration request message to the UDR.
- the policy configuration request message may include the ASP ID.
- the policy configuration request message may also include one or more of the following: flow description information; time window information; first area information; internal transaction identifier; DNN and S-NSSAI.
- the NEF may save the content in the policy configuration request message, that is, the policy configuration information, as application information (Application Data) to the UDR, and the subsequent PCF may obtain the policy configuration information from the UDR according to the internal transaction identifier or the ASP ID.
- the UDR can push the policy configuration information to the PCF.
- the PCF after the PCF obtains the policy configuration information, it can save the policy configuration information for subsequent use.
- the fifth response message is used to indicate that the UDR successfully receives the policy configuration request message. It should be understood that S505 is an optional step.
- S506 to 511 are the same as S406 to S411, and you can refer to S406 to S411.
- S510 can be executed at any time after S501 or S502.
- S512 The AMF sends a user policy association request message to the PCF.
- the user policy association request message may include internal transaction identification and/or ASP ID.
- the user policy association request message may further include one or more of the following: time window information; first area information; internal transaction identifier; DNN and S-NSSAI.
- S512 is specifically: the AMF sends a user policy association request message to the V-PCF.
- S512 is specifically: the AMF sends a user policy association request message to the V-PCF, and then the V-PCF forwards the user policy association request message to the H-PCF.
- the PCF in the subsequent steps may be V-PCF or H-PCF accordingly.
- the third response message is used to indicate that the PCF successfully receives the user policy association request message. It should be understood that S513 is an optional step.
- S514 The PCF obtains the policy configuration information from the UDR according to the user policy association request message.
- the PCF may obtain the policy configuration information from the UDR according to the internal transaction identifier and/or ASP ID, or the PCF may obtain the policy configuration information from the information pushed by the UDR to the PCF according to the internal transaction identifier and/or ASP ID, and The first URSP may be further generated according to the policy configuration information and local operator configuration information. It should be understood that if the PCF obtains the policy configuration information from the UDR according to the internal transaction identifier, the policy configuration information also includes the internal transaction identifier.
- S515 The PCF generates a first URSP according to the policy configuration information.
- S516 to S518 are the same as S240 to S260, and you can refer to S240 to S260.
- AF sends policy configuration information to UDR via NEF, and sends a service-related configuration request to AMF.
- AMF initiates a user policy association request to the PCF for the target UE entering the target area.
- the PCF can According to the policy configuration information obtained from the UDR, the URSP on the target UE is updated in time to provide network guarantee for the target UE to access the applications deployed in the target area.
- Fig. 6 is another method for configuring services provided by this application.
- the AMF determines whether the target UE is located in the target area, and in this method, the PCF determines whether the target UE is located in the target area.
- the method 600 may include some or all of the steps in S601 to S610. Each step is explained separately below.
- S601 to S602 are the same as S301 to S302, and you can refer to S301 to S302.
- the NEF sends a policy configuration request message to all PCFs in the network or some PCFs with user policy decision-making functions or PCFs that support providing services for the area.
- the PCF After the PCF receives the policy configuration request message, it saves the content in the policy configuration request message, that is, the policy configuration information.
- the policy configuration information includes the first area information and the ASP ID.
- the policy configuration request message may also include one or more of the following: flow description information; time window information; first area information; internal transaction identifier; DNN and S-NSSAI.
- the NEF may also send the policy configuration request message to the UDR.
- the policy configuration information in the policy configuration request message must be obtained from the UDR.
- the PCF may obtain the policy configuration information from the UDR when receiving the location indication information sent by the AMF.
- the UDR can actively push the policy configuration information to the PCF.
- the NEF sends a second response message to the AF.
- the second response message is used to indicate that the NEF successfully receives the second configuration request message.
- S604 is an optional step.
- S605 The AMF sends location indication information to the PCF.
- the location indication information is used to indicate the current location of the target UE, or the location indication information is used to indicate that the target UE enters or leaves the target area.
- S605 can be implemented in two ways:
- Manner 1 When the target UE initiates a registration request and/or a handover request, it sends a policy control request message to the PCF, where the policy control request message includes the location indication information.
- the policy control request message is a policy control establishment request message or a policy control update request message.
- the PCF can subscribe to the AMF for UE location change events, such as subscribing to the event that the UE enters the target area. Then, when the UE enters the target area, the AMF will send the PCF the location indication information. Optionally, the PCF may only subscribe to the location of the target UE and update the event.
- the process of the PCF subscribing to the AMF for the location change event of the target UE may include: the PCF sends an event subscription request message to the AMF.
- the event subscription request message is used to subscribe to the target UE’s location in the target area. Location change event.
- the AMF sends the location indication information to the PCF.
- S606 The PCF judges whether the target UE will be located in the target area according to the location indication information.
- S607 is executed, otherwise S607 and subsequent steps are not executed.
- the PCF generates a first URSP according to the policy configuration information.
- the PCF can determine the flow description information and the user selection description information according to the policy configuration information and the local configuration information, so that the first URSP can be generated.
- S608 to S610 are the same as S240 to S260, and you can refer to S240 to S260.
- AMF does not need to perceive the related configuration process of the first service.
- PCF directly judges whether the target UE is in the target area based on the location information provided by AMF. If the target UE is located in the target area, PCF performs user policy decision and provides The updated URSP policy rules are applied to the target UE, so as to provide network guarantee for the target UE to access the deployed applications in the target area.
- Fig. 7 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- the communication device 700 may include a transceiving unit 710 and a processing unit 720.
- the transceiver unit 710 may be used to receive information (or messages) sent by other devices, and may also be used to send information (or messages) to other devices. For example, sending or receiving user policy association request messages.
- the processing unit 720 may be used to perform internal processing of the device, such as generating the first URSP.
- the communication device 700 may correspond to the AMF in the foregoing method embodiment.
- the communication device 1700 may be an AMF or a chip in an AMF.
- the communication device 700 may include a unit for performing operations performed by the AMF in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the AMF in the foregoing method embodiment.
- the transceiver unit 710 may be configured to: receive a first configuration request message from a network open network element (such as NEF), where the first configuration request message includes first area information, and The first area information is used to indicate the target area; if the processing unit 720 determines that the target terminal device is located in the target area, it sends a user policy association request message to the policy control network element, and the user policy association request message is used to request all
- the policy control network element configures a first user routing policy URSP to the target terminal device, and the first URSP is used for the target terminal device to access a first service; and the policy control network element receives the And send the first URSP to the target terminal device (for example, target UE).
- the communication device 700 may correspond to the PCF in the foregoing method embodiment.
- the communication device 700 may be a PCF or a chip in the PCF.
- the communication device 700 may include a unit for performing operations performed by the PCF in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the PCF in the foregoing method embodiment.
- the transceiver unit 710 is configured to receive a user policy association request message from an access management network element (for example, AMF), where the user policy association request message includes an application identifier, The application identifier is used to indicate the application that provides the first service; the processing unit 720 is used to generate a first user routing policy URSP according to the user policy association request message, and the first URSP is used for the target terminal The device accesses the first service; the transceiver unit 710 is further configured to send the first URSP to the target terminal device (for example, target UE).
- AMF access management network element
- the transceiver unit 710 is configured to obtain policy configuration information, where the policy configuration information includes an application identifier, and the application identifier is used to indicate an application that provides the first service; the transceiver unit 710 also Used to receive a user policy association request message from an access management network element (e.g., AMF), where the user policy association request message is used to request the apparatus to configure a first user with a target terminal device (e.g., target UE) Routing strategy URSP, the first URSP is used for a target terminal device to access the first service, and the target terminal device is located in a target area; the processing unit 720 is used for generating the The first URSP; the transceiver unit 710 is further configured to send the first URSP to the target terminal device.
- AMF access management network element
- the transceiver unit 710 is configured to obtain policy configuration information, the policy configuration information includes first area information and an application identifier, the first area information is used to indicate a target area, and the application The identifier is used to indicate the application that provides the first service; the transceiving unit 710 is also used to receive location indication information from the access management network element; the processing unit 720 is used to determine if based on the location indication information If the target terminal device is located in the target area, a first user routing strategy URSP is generated according to the policy configuration information; the transceiver unit 710 is further configured to send the first URSP to the target terminal device, The first URSP is used for the target terminal device to access the first service.
- the communication device 700 may correspond to the NEF in the foregoing method embodiment.
- the communication device 700 may be a NEF or a chip in the NEF.
- the communication device 700 may include a unit for performing operations performed by the NEF in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the NEF in the foregoing method embodiment.
- the communication device 700 may correspond to the AF in the foregoing method embodiment.
- the communication device 700 may be an AF or a chip in the AF.
- the communication device 700 may include a unit for performing operations performed by the AF in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the AF in the foregoing method embodiment.
- the communication device 700 may correspond to the UDR in the foregoing method embodiment.
- the communication device 700 may be a UDR or a chip in the UDR.
- the communication device 700 may include a unit for performing operations performed by the UDR in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the UDR in the foregoing method embodiment.
- the communication device 700 may correspond to the target UE in the foregoing method embodiment.
- the communication device 700 may be the target UE or a chip in the target UE.
- the communication device 700 may include a unit for performing operations performed by the target UE in the foregoing method embodiment, and each unit in the communication device 700 is used to implement the operations performed by the target UE in the foregoing method embodiment.
- the transceiving unit 710 in the communication device 700 may correspond to the transceiver 2020 in the terminal device 2000 shown in FIG. 8, and the processing unit 720 in the communication device 700 may correspond to The processor 2010 in the terminal device 2000 is shown in FIG. 8.
- the transceiver unit 710 in the communication device 700 may be an input/output interface.
- the transceiver unit 710 in the communication device 700 may correspond to the communication interface 3010 shown in FIG. 9, and the processing unit 720 It may correspond to the processor 3020 shown in FIG. 9.
- FIG. 8 is a schematic structural diagram of a terminal device 2000 provided by an embodiment of the present application.
- the terminal device 2000 can be applied to the system shown in FIG. 1 to perform the function of the target UE in the foregoing method embodiment.
- the terminal device 2000 includes a processor 2010 and a transceiver 2020.
- the terminal device 2000 further includes a memory 2030.
- the processor 2010, the transceiver 2002, and the memory 2030 can communicate with each other through internal connection paths to transfer control or data signals.
- the memory 2030 is used to store computer programs, and the processor 2010 is used to call and transfer from the memory 2030. Run the computer program to control the transceiver 2020 to send and receive signals.
- the terminal device 2000 may further include an antenna 2040 for transmitting the uplink data or uplink control signaling output by the transceiver 2020 through a wireless signal.
- the above-mentioned processor 2010 and the memory 2030 may be combined into a processing device, and the processor 2010 is configured to execute the program code stored in the memory 2030 to realize the above-mentioned functions.
- the memory 2030 may also be integrated in the processor 2010 or independent of the processor 2010.
- the processor 2010 may correspond to the processing unit in FIG. 7.
- the above transceiver 2020 may correspond to the transceiver unit in FIG. 7.
- the transceiver 2020 may include a receiver (or receiver, receiving circuit) and a transmitter (or transmitter, transmitting circuit). Among them, the receiver is used to receive signals, and the transmitter is used to transmit signals.
- the terminal device 2000 shown in FIG. 8 can implement each process involving the target UE in any method embodiment of the foregoing method embodiments.
- the operation or function of each module in the terminal device 2000 is to implement the corresponding process in the foregoing method embodiment.
- the above-mentioned processor 2010 may be used to perform the actions described in the foregoing method embodiments that are implemented internally by the target UE, and the transceiver 2020 may be used to perform the target UE’s transmission to or from other network elements described in the foregoing method embodiments. Received action.
- the transceiver 2020 may be used to perform the target UE’s transmission to or from other network elements described in the foregoing method embodiments. Received action.
- the aforementioned terminal device 2000 may further include a power supply 2050 for providing power to various devices or circuits in the terminal device.
- the terminal device 2000 may also include one or more of an input unit 2060, a display unit 2070, an audio circuit 2080, a camera 2090, and a sensor 2100.
- the audio circuit It may also include a speaker 2082, a microphone 2084, and so on.
- FIG. 9 is a schematic structural diagram of a communication device according to an embodiment of the present application. It should be understood that the communication device 3000 shown in FIG. 9 is only an example, and the communication device in the embodiment of the present application may also include other modules or units, or include modules with similar functions to the modules in FIG. All modules in 9.
- the communication device 3000 includes a communication interface 3010 and at least one processor 3020.
- the communication device 3000 can correspond to any network element among AMF, PCF, AF, NEF, and UDR.
- at least one processor 3020 can be used to execute the actions described in the previous method embodiments implemented by the corresponding network element, and the transceiver 2020 can be used to execute the corresponding network element to other network elements described in the previous method embodiment. The act of sending or receiving from other network elements.
- at least one processor 3020 executes program instructions, so that the communication device 3000 implements the corresponding process of the method executed by the corresponding network element in the foregoing method embodiment.
- the communication device 3000 may further include a memory.
- the memory can store program instructions, and at least one processor 3020 can read the program instructions stored in the memory and execute the program instructions.
- the processor in the embodiment of the present application may be a central processing unit (Central Processing Unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processors, DSP), and application specific integrated circuits (application specific integrated circuits). integrated circuit, ASIC), ready-made programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the present application also provides a computer program product, the computer program product includes: computer program code, when the computer program code runs on a computer, the computer executes the method involved in the foregoing method embodiments The corresponding method of any network element.
- the present application also provides a system, which includes at least one of the aforementioned target UE, AMF, PCF, AF, NEF, and UDR.
- An embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute the method in any of the foregoing method embodiments.
- the processing device may be a chip.
- the processing device may be a field programmable gate array (FPGA), a general-purpose processor, a digital signal processor (digital signal processor, DSP), or an application specific integrated circuit (ASIC) , Ready-made programmable gate array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, or system on chip (SoC), or central processing
- the central processor unit (CPU) can also be a network processor (NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (microcontroller unit, MCU) It can also be a programmable logic device (PLD) or other integrated chips.
- NP network processor
- DSP digital signal processor
- MCU microcontroller
- PLD programmable logic device
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application can be directly embodied as being executed and completed by a hardware decoding processor, or executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a mature storage medium in the field, such as random access memory, flash memory, read-only memory, programmable read-only memory, or electrically erasable programmable memory, registers.
- the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be read-only memory (ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), and electrically available Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- the volatile memory may be random access memory (RAM), which is used as an external cache.
- RAM random access memory
- static random access memory static random access memory
- dynamic RAM dynamic RAM
- DRAM dynamic random access memory
- synchronous dynamic random access memory synchronous DRAM, SDRAM
- double data rate synchronous dynamic random access memory double data rate SDRAM, DDR SDRAM
- enhanced synchronous dynamic random access memory enhanced SDRAM, ESDRAM
- synchronous connection dynamic random access memory serial DRAM, SLDRAM
- direct rambus RAM direct rambus RAM
- the computer may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- software it can be implemented in the form of a computer program product in whole or in part.
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions may be transmitted from a website, computer, server, or data center.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or a data center integrated with one or more available media.
- the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (for example, a solid state disk (solid state disc), SSD)) etc.
- the network equipment in each of the above-mentioned device embodiments corresponds completely to the network equipment or terminal equipment in the terminal equipment and method embodiments, and the corresponding modules or units execute the corresponding steps.
- the communication unit executes the receiving or the terminal equipment in the method embodiments.
- the processing unit executes the functions of specific units, refer to the corresponding method embodiments. Among them, there may be one or more processors.
- a component may be, but is not limited to, a process, a processor, an object, an executable file, an execution thread, a program, or a computer running on the processor.
- the application running on the computing device and the computing device can be components.
- One or more components can reside in a process or thread of execution, and the components can be located on one computer or distributed between two or more computers.
- these components can be executed from various computer readable media having various data structures stored thereon.
- a component can pass a local signal based on a signal having one or more data packets (for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal). Or remote process to communicate.
- a signal having one or more data packets for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal.
- remote process to communicate for example, data from two components that interact with another component in a local system, a distributed system, or a network, such as the Internet that interacts with other systems through a signal.
- a corresponding to B means that B is associated with A, and B can be determined according to A.
- determining B based on A does not mean that B is determined only based on A, and B can also be determined based on A and/or other information.
- the item can be any of the following: A; B ; C; A and B; A and C; B and C; A, B and C; A and A; A, A and A; A, A and B; A, A and C, A, B and B; A , C and C; B and B, B, B and B, B, B and C, C and C; C, C and C, and other combinations of A, B and C.
- the item can be any of the following: A; B ; C; A and B; A and C; B and C; A, B and C; A and A; A and B; A, A and C, A, B and B; A , C and C; B and B, B, B and C, C and C; C, C and C, and other combinations of A, B and C.
- the item includes at least one of the following: A, B, ..., and X"
- the applicable items for the item can also be obtained in accordance with the aforementioned rules.
- the terminal device and/or the network device can perform some or all of the steps in the embodiments of the present application. These steps or operations are only examples, and the embodiments of the present application may also perform other operations or various operations. Deformation of the operation. In addition, each step may be performed in a different order presented in the embodiment of the present application, and it may not be necessary to perform all the operations in the embodiment of the present application.
- the disclosed system, device, and method may be implemented in other ways.
- the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the technical solution of the present application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read only memory ROM, random access memory RAM, magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供了一种配置业务的方法、通信装置和通信系统,由AF通过NEF向AMF配置业务请求,使得AMF可以在目标UE位于目标区域时,向PCF请求URSP配置,从而PCF可以在应用服务动态部署场景下有效配置URSP,避免提前向可能的所有UE配置URSP造成的不必要的信令开销。
Description
本申请要求于2019年09月26日提交中国专利局、申请号为201910918864.4、申请名称为“配置业务的方法、通信装置和通信系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信领域,并且更具体地,涉及一种配置业务的方法、通信装置和通信系统。
现阶段,提出用户路由选择策略(user routing selection policy,URSP)需支持边缘计算业务。边缘计算业务可简单理解为,应用功能(application function,AF)可选择在边缘位置动态部署应用服务,如体育场馆在重大赛事期间可通过部署直播/回放业务,实现该场馆区域内观众切换观看视角、回放精彩环节等功能,提升用户观看体验。通常而言,由于该业务需保证大带宽、低时延,该业务可能仅允许临近区域内的用户接入访问。
在接入特定业务时,终端设备需根据URSP规则选择正确的协议数据单元(protocol data unit,PDU)会话配置参数,以便接入特定应用服务并获得相应的服务质量保障。然而,对于动态部署的应用服务而言,由于任何用户都有可能进入该区域,若为所有用户提前配置该URSP规则,而实际需要接入该业务的用户有限,则会造成信令资源的浪费。
发明内容
本申请提供了一种配置业务的方法、通信装置和通信系统,能够在应用服务动态部署场景下有效配置URSP,避免不必要的信令开销。
第一方面,提供了一种配置业务的方法,包括:接入管理网元接收来自于网络开放网元的第一配置请求消息,第一配置请求消息包括第一区域信息,第一区域信息用于指示目标区域;若目标终端设备位于目标区域,所述接入管理网元向策略控制网元发送用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向所述目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于所述目标终端设备接入第一业务;所述接入管理网元接收来自于所述策略控制网元的所述第一URSP,并向所述目标终端设备发送所述第一URSP。
根据本申请提供的方法,目标终端设备在目标区域时,策略控制网元才给目标终端设备配置第一URSP,从而使得目标终端设备只有在目标区域时,才能根据第一URSP接入相应的业务。相比于现有技术不关心目标终端设备的位置,提前为所有目标终端设备配置第一URSP的方案,本申请的方案能够有效配置URSP,避免不必要的信令开销。
结合第一方面,在第一方面的某些实现方式中,所述第一配置请求消息和所述用户策 略关联请求消息均还包括应用标识,所述应用标识用于指示提供所述第一业务的应用。
示例性的,本申请中,所述应用标识可以是应用服务提供商(application service Provider,ASP)标识(identifier,ID),所述ASP ID指示的应用服务提供商ASP提供所述第一业务。或者,所述应用标识可以是应用业务标识(AF Service Identifier),或者还可以是具体的应用标识信息。
结合第一方面,在第一方面的某些实现方式中,所述第一配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称(data network name,DNN)以及单个网络切片选择辅助信息(single-network slice selection assistance information,S-NSSAI)。相应地,所述用户策略关联请求消息还包括下述中的一种或多种:流描述信息、时间窗信息、所述第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是所述网络开放网元根据所述应用标识确定的。
基于该方案,可以由接入管理网元提供用于生成第一URSP的信息,从而策略控制网元可以根据接入管理网元提供的信息,生成URSP。
结合第一方面,在第一方面的某些实现方式中,所述第一配置请求消息和所述用户策略关联请求消息均包括应用标识和内部事务标识,或者,所述第一配置请求消息和所述用户策略关联请求消息均包括内部事务标识,其中,所述应用标识用于指示提供所述第一业务的应用,所述内部事务标识用于标识所述第一业务的配置请求。。
基于该方案,策略控制网元可以基于应用标识和内部事务标识,或者基于内部事务标识,从本地或者数据存储网元中获取用于生成URSP的信息,策略控制网元根据所获取的信息可以生成URSP。
结合第一方面,在第一方面的某些实现方式中,在所述接入管理网元向策略控制网元发送用户策略关联请求消息之前,所述接入管理网元还可以根据将其所服务的各终端设备的当前位置信息与所述第一区域信息进行比对,以确定在目标区域中的终端设备。
第二方面,提供了一种配置业务的方法,包括:策略控制网元接收来自于接入管理网元的用户策略关联请求消息,所述用户策略关联请求消息包括应用标识,所述应用标识所用于指示提供第一业务的应用;所述策略控制网元根据所述用户策略关联请求消息,生成第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务;所述策略控制网元向所述目标终端设备发送所述第一URSP。
可选地,策略控制网元可以通过接入管理网元,向终端设备发送所述第一URSP。
根据本申请提供的方法,目标终端设备在目标区域时,策略控制网元才给目标终端设备配置第一URSP,从而使得目标终端设备只有在目标区域时,才能根据第一URSP接入相应的业务。相比于现有技术不关心目标终端设备的位置,提前为所有目标终端设备配置第一URSP的方案,本申请的方案能够有效配置URSP,避免不必要的信令开销。
结合第二方面,在第二方面的某些实现方式中,所述用户策略关联请求消息还包括下述中的一种或多种:流描述信息、时间窗信息、第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述流描述信息用于描述所述第一业务;
所述时间窗信息用于指示所述第一业务的可用时间;所述第一区域信息用于指示所述目标区域;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
第三方面,提供了一种配置业务的方法,包括:策略控制网元获取策略配置信息,所述策略配置信息包括应用标识,所述应用标识用于指示提供第一业务的应用;所述策略控制网元接收来自于接入管理网元的用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务,所述目标终端设备位于目标区域;所述策略控制网元根据所述策略配置信息,生成所述第一URSP;所述策略控制网元向所述所述目标终端设备发送所述第一URSP。
可选地,策略控制网元可以通过接入管理网元,向终端设备发送所述第一URSP。
根据本申请提供的方法,策略控制网元可以获取策略配置信息,并且在目标终端设备位于目标区域时,根据该策略配置信息向目标终端设备配置第一URSP,从而使得目标终端设备只有在目标区域时,才能根据第一URSP接入相应的业务。相比于现有技术不关心目标终端设备的位置,提前为所有目标终端设备配置第一URSP的方案,本申请的方案能够有效配置URSP,避免不必要的信令开销。
结合第三方面,在第三方面的某些实现方式中,所述策略控制网元获取策略配置信息,包括:所述策略控制网元从网络开放网元接收策略配置请求消息,所述策略配置请求消息包括所述策略配置信息;或者,所述策略控制网元从数据存储网元中获取所述策略配置信息。
这里,所述策略配置信息是所述网络开放网元发送给所述数据存储网元的。
基于该方案,网络开放网元可以将策略配置信息配置给策略控制网元;或者,网络开放网元可以将策略配置信息配置给数据存储网元,策略控制网元可以从数据存储网元中获取该策略配置信息。
结合第三方面,在第三方面的某些实现方式中,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述第一区域信息用于指示目标区域,所述目标区域为允许所述目标终端设备接入所述第一业务的区域;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
结合第三方面,在第三方面的某些实现方式中,所述用户策略关联请求消息包括所述应用标识和/或内部事务标识,所述内部事务标识用于标识所述第一业务的配置请求。
第四方面,提供了一种配置业务的方法,包括:策略控制网元获取策略配置信息,所述策略配置信息包括第一区域信息和应用标识,所述第一区域信息用于指示目标区域,所述应用标识用于指示提供第一业务的应用;所述策略控制网元接收来自于接入管理网元的位置指示信息;所述策略控制网元根据所述位置指示信息,若确定目标终端设备位于所述目标区域,根据所述策略配置信息,生成第一用户路由选择策略URSP;所述策略控制网元向所述目标终端设备发送所述第一URSP,所述第一URSP用于所述目标终端设备接入 所述第一业务。
可选地,所述位置指示信息用于指示目标终端设备的当前位置,或者,所述位置指示信息用于指示所述目标终端设备进入或者离开所述目标区域。
可选地,所述接入管理网元可以通过接入管理网元,向终端设备发送所述第一URSP。
根据本申请提供的方法,策略控制网元可以在目标终端设备于目标区域时,根据该策略配置信息向目标终端设备配置第一URSP,从而使得目标终端设备只有在目标区域时,才能根据第一URSP接入相应的业务。相比于现有技术不关心目标终端设备的位置,提前为所有目标终端设备配置第一URSP的方案,本申请的方案能够有效配置URSP,避免不必要的信令开销。
结合第四方面,在第四方面的某些实现方式中,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于所述描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
结合第四方面,在第四方面的某些实现方式中,所述策略控制网元获取策略配置信息,包括:所述策略控制网元从网络开放网元接收第一配置请求消息,所述第一配置请求消息包括所述策略配置信息;或者,所述策略控制网元从数据存储网元中获取所述策略配置信息。
这里,所述策略配置信息是所述网络开放网元发送给所述数据存储网元的。
结合第四方面,在第四方面的某些实现方式中,所述位置指示信息用于指示所述目标终端设备的当前位置;其中,所述策略控制网元从接入管理网元接收位置指示信息,包括:所述策略控制网元从所述接入管理网元接收策略控制请求消息,所述策略控制请求消息包括所述位置指示信息,所述策略控制请求消息为策略控制建立请求消息或策略控制更新请求消息。
结合第四方面,在第四方面的某些实现方式中,所述位置指示信息用于指示所述目标终端设备进入或者离开所述目标区域;以及,在所述策略控制网元从接入管理网元接收位置指示信息之前,所述方法还包括:所述策略控制网元向所述接入管理网元发送事件订阅请求消息,所述事件订阅请求消息用于指示所述目标终端设备在进入或者离开所述目标区域时,向所述策略控制网元发送位置指示信息。
第五方面,提供了一种配置业务的方法,包括:应用网元生成第二配置请求消息,所述第二配置请求消息包括应用标识和第二区域信息,所述应用标识用于指示提供第一业务的应用,所述第二区域信息用于指示目标区域,所述第二业务配置请求消息用于配置目标终端设备在所述目标区域时接入所述第一业务;所述应用网元向网络开放网元发送所述第二配置请求消息。
根据本申请提供的方法,应用网元对网络开放网元进行第一业务配置,从而网络开放网元可以将相关的配置发送给策略控制网元或者接入管理网元或者数据存储网元,使得策略控制网元可以在目标终端设备于目标区域时,根据该策略配置信息向目标终端设备配置第一URSP。
可选地,所述第二配置请求消息还包括下述中的一种或多种:外部群组标识、流描述信息、时间窗信息、外部事务标识。其中,所述外部群组标识用于指示允许接入所述第一业务的多个终端设备,所述目标终端设备为所述多个终端设备中的任一终端设备;所述流描述信息用于描述所述第一业务的业务流;所述时间窗信息用于指示所述第一业务的可用时间;所述外部事务标识用于标识所述第二业务配置请求消息。
第六方面,提供了一种配置业务的方法,包括:网络开放网元从应用网元接收第二配置请求消息,所述第二配置请求消息包括应用标识和第二区域信息,所述应用标识用于指示提供第一业务的应用,所述第二区域信息用于指示目标区域,所述第二配置请求消息用于配置目标终端设备在所述目标区域时接入所述第一业务。接着,所述网络开放网元根据所述第二配置请求消息,生成第一配置请求消息,并向接入管理网元发送所述第一配置请求消息,其中,所述第一配置请求消息包括第一区域信息和所述应用标识,所述第一区域信息用于指示所述目标区域,所述第一区域信息是根据所述第二区域信息确定的。
根据本申请提供的方法,接入管理网元可以根据网络开放网元发送的第一配置请求消息,在目标终端设备位于目标区域时,向策略控制网元请求第一URSP。相应地,策略控制网元可以在目标终端设备于目标区域时,向目标终端设备配置第一URSP,从而目标终端设备可以在目标区域时接入第一业务。
可选地,所述第二配置请求消息还包括下述中的一种或多种:外部群组标识、流描述信息、时间窗信息、外部事务标识。以及,所述第一配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述外部群组标识和所述内部群组标识均用于指示允许接入所述第一业务所有目标终端设备,所述内部群组标识是根据所述外部群组标识确定的;所述流描述信息用于描述所述第一业务的业务流;所述时间窗信息用于指示所述第一业务的可用时间;所述外部事务标识用于标识所述第二配置请求消息,所述内部事务标识用于标识所述第一配置请求消息,所述内部事务标识是根据所述外部事务标识确定的。
第七方面,提供了一种配置业务的方法,包括:网络开放网元从应用网元接收第二配置请求消息,所述第二配置请求消息包括应用标识和第二区域信息,所述应用标识用于指示提供第一业务的应用,所述第二区域信息用于指示目标区域,所述第二配置请求消息用于配置目标终端设备在所述目标区域时接入所述第一业务。接着,所述网络开放网元根据所述第二配置请求消息,生成第一配置请求消息和策略配置请求消息,并向策略控制网元或数据存储网元发送策略配置请求消息,向接入管理网元发送所述第一配置请求消息,所述第一配置请求消息包括所述第一区域信息,所述策略配置请求消息包括应用标识。
根据本申请提供的方法,接入管理网元可以根据网络开放网元发送的第一配置请求消息,在目标终端设备位于目标区域时,向策略控制网元请求第一URSP。相应地,策略控制网元可以在目标终端设备于目标区域时,根据策略配置请求消息,生成并向目标终端设备配置第一URSP,从而目标终端设备可以在目标区域时接入第一业务。
可选地,所述第二配置请求消息还包括下述中的一种或多种:外部群组标识、流描述信息、时间窗信息、外部事务标识。以及,所述第一配置请求消息和/或所述策略配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务 标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述外部群组标识和所述内部群组标识均用于指示允许接入所述第一业务所有目标终端设备,所述内部群组标识是根据所述外部群组标识确定的;所述流描述信息用于描述所述第一业务的业务流;所述时间窗信息用于指示所述第一业务的可用时间;所述外部事务标识用于标识所述第二配置请求消息,所述内部事务标识用于标识所述第一配置请求消息,所述内部事务标识是根据所述外部事务标识确定的。
第八方面,提供了一种配置业务的方法,包括:网络开放网元从应用网元接收第二配置请求消息,所述第二配置请求消息包括应用标识和第二区域信息,所述应用标识用于指示提供第一业务的应用,所述第二区域信息用于指示目标区域,所述第二配置请求消息用于配置目标终端设备在所述目标区域时接入所述第一业务。接着,所述网络开放网元根据所述第二配置请求消息,生成策略配置请求消息,并向策略控制网元发送所述策略配置请求消息。所述策略配置请求消息包括所述第一区域信息和应用标识。
根据本申请提供的方法,策略控制网元可以在目标终端设备于目标区域时,根据策略配置请求消息,生成并向目标终端设备配置第一URSP,从而目标终端设备可以在目标区域时接入第一业务。
可选地,所述第二配置请求消息还包括下述中的一种或多种:外部群组标识、流描述信息、时间窗信息、外部事务标识。以及,所述策略配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI。其中,所述外部群组标识和所述内部群组标识均用于指示允许接入所述第一业务所有目标终端设备,所述内部群组标识是根据所述外部群组标识确定的;所述流描述信息用于描述所述第一业务的业务流;所述时间窗信息用于指示所述第一业务的可用时间;所述外部事务标识用于标识所述第二配置请求消息,所述内部事务标识用于标识所述第一配置请求消息,所述内部事务标识是根据所述外部事务标识确定的。
第九方面,提供了一种通信装置,包括用于执行第一方面至第八方面以及第一方面或第八方面中任一种可能实现方式中的方法的各个模块或单元。
第十方面,提供了一种通信装置,包括处理器。该处理器与存储器耦合,可用于执行存储器中的指令,以实现上述第一方面至第八方面以及第一方面至第八方面中任一种可能实现方式中的方法。可选地,该通信装置还包括存储器。可选地,该通信装置还包括通信接口,处理器与通信接口耦合。
第十一方面,提供了一种处理器,包括:输入电路、输出电路和处理电路。所述处理电路用于通过所述输入电路接收信号,并通过所述输出电路发射信号,使得所述处理器执行第一方面至第八方面以及第一方面至第八方面中任一种可能实现方式中的方法。
在具体实现过程中,上述处理器可以为一个或多个芯片,输入电路可以为输入管脚,输出电路可以为输出管脚,处理电路可以为晶体管、门电路、触发器和各种逻辑电路等。输入电路所接收的输入的信号可以是由例如但不限于接收器接收并输入的,输出电路所输出的信号可以是例如但不限于输出给发射器并由发射器发射的,且输入电路和输出电路可以是同一电路,该电路在不同的时刻分别用作输入电路和输出电路。本申请实施例对处理器及各种电路的具体实现方式不做限定。
第十二方面,提供了一种处理装置,包括处理器和存储器。该处理器用于读取存储器中存储的指令,并可通过接收器接收信号,通过发射器发射信号,以执行第一方面至第八方面以及第一方面至第八方面中任一种可能实现方式中的方法。
可选地,所述处理器为一个或多个,所述存储器为一个或多个。
可选地,所述存储器可以与所述处理器集成在一起,或者所述存储器与处理器分离设置。
在具体实现过程中,存储器可以为非瞬时性(non-transitory)存储器,例如只读存储器(read only memory,ROM),其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上,本申请实施例对存储器的类型以及存储器与处理器的设置方式不做限定。
上述第十二方面中的处理装置可以是一个或多个芯片。该处理装置中的处理器可以通过硬件来实现也可以通过软件来实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等;当通过软件来实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现,该存储器可以集成在处理器中,可以位于该处理器之外,独立存在。
第十三方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序(也可以称为代码,或指令),当所述计算机程序被运行时,使得计算机执行上述第一方面至第八方面以及第一方面至第八方面中任一种可能实现方式中的方法。
第十四方面,提供了一种计算机可读存储介质,所述计算机可读介质存储有计算机程序(也可以称为代码,或指令)当其在计算机上运行时,使得计算机执行上述第一方面至第八方面以及第一方面至第八方面中任一种可能实现方式中的方法。
第十五方面,提供了一种通信系统,包括前述策略控制网元、接入管理网元、数据存储网元、应用网元以及网络开放网元中的至少两个网元。可选地,该通信系统还可以包括前述中的目标终端设备。
图1是系统架构的示意性框图;
图2是本申请提供的一种配置业务的方法的示意性流程图;
图3是本申请提供的配置业务的方法的具体例子的示意性流程图;
图4是本申请提供的一种配置业务的方法的另一具体例子的示意性流程图;
图5是本申请提供的一种配置业务的方法的又一具体例子的示意性流程图;
图6是本申请提供的另一种配置业务的方法的示意性流程图;
图7是本申请提供的通信装置的示意性框图;
图8是本申请提供的终端设备的示意性框图;
图9是本申请提供的另一通信装置的示意性框图。
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于第五代(5th generation,5G)系统或新无线(new radio,NR)通信系统,也可以应用于未来可能出现的其他的通信系统,如6G通信系统。。
图1是5G系统架构的一个示意图。如图1所示,该系统架构可以包括用户设备(user equipment,UE)101、无线接入网(radio access network,RAN)网元102、策略控制功能(policy control function)103、数据网络(data network,DN)104、接入与移动性管理功能(access and mobility management function,AMF)105、会话管理功能(session management function,SMF)106、策略控制功能(policy control function,PCF)107、应用功能(application function,AF)108、统一数据管理(unified data management,UDM)109、统一数据仓库(unified data repository,UDR)110和网络开放功能(network exposure function,NEF)111。下面对该网络架构中涉及的各个网元分别进行说明。
1、UE:也可以称为终端设备。终端设备可以经RAN网元与一个或多个核心网(core network,CN)进行通信。终端设备可称为接入终端、终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、无线网络设备、用户代理或用户装置。终端可以是蜂窝电话、无绳电话、会话启动协议(session initiation protocol,SIP)电话、无线本地环路(wireless localloop,WLL)站、个人数字处理(personal digital assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它设备、车载设备、可穿戴设备或物联网、车辆网中的终端设备以及未来网络中的任意形态的终端设备等。
2、RAN网元:是一种将UE接入到无线网络的设备。RAN网元可以是基站NodeB、演进型基站(evloved NodeB,eNB)、5G移动通信系统中的下一代基站(next generation NodeB,gNB)、传输点、未来移动通信系统中的基站或无线保真(wireless fidelity,Wi-Fi)系统中的接入节点或5G系统中的基站的一个或一组(包括多个天线面板)天线面板。或者,无线接入网设备还可以是构成gNB或传输点的网络节点,如基带单元(baseband unit,BBU),或,分布式单元(distributed unit,DU),或,集中式单元(centralized unit,CU),或,集中式单元控制面(centralized unit control plane,CU-CP)和集中式单元用户面(centralized unit user plane,CU-UP)等。本申请的实施例对无线接入网设备所采用的具体技术和具体设备形态不做限定。在一些部署中,gNB可以包括CU和DU。一个CU可以连接一个DU,或者也可以多个DU共用一个CU,可以节省成本,以及易于网络扩展。CU实现gNB的部分功能,DU实现gNB的部分功能。比如,CU负责处理非实时协议和服务,以实现无线资源控制(radio resource control,RRC)层,分组数据汇聚层协议(packet data convergence protocol,PDCP)层的功能。DU负责处理物理层协议和实时服务,以实现无线链路控制(radio link control,RLC)层、媒体接入控制(media access control,MAC)层和物理(physical,PHY)层的功能。CU和DU的切分可以按照上述协议栈进行切分,本申请实施例中并不完全限定上述协议栈切分方式,还可以有其它的切分方式,具体可以参考TR38.801v14.0.0。
CU和DU之间通过F1接口连接。CU代表gNB通过Ng接口和核心网连接。更进一步,集中式单元CU还可以划分为控制面(CU-CP)和用户面(CU-UP)。其中CU-CP负责控制面功能,主要包含RRC和分组数据汇聚层协议控制面(packet data convergence protocol control,PDCP-C)。PDCP-C主要负责控制面数据的加解密,完整性保护,数据传输等至少一种功能。CU-UP负责用户面功能,主要包含业务数据适配协议(service data adaptation protocol,SDAP)和分组数据汇聚层协议用户面(packet data convergence protocol user,PDCP-U)。其中SDAP主要负责将核心网的数据进行处理并将flow映射到承载。PDCP-U主要负责数据面的加解密,完整性保护,头压缩,序列号维护,数据传输等至少一种功能。其中CU-CP和CU-UP通过E1接口连接。CU-CP代表gNB通过Ng接口和核心网连接。通过F1-C(控制面)和DU连接。CU-UP通过F1-U(用户面)和DU连接。当然还有一种可能的实现是PDCP-C也在CU-UP。
gNB还可以包括有源天线单元(active antenna unit,AAU)。AAU实现部分物理层处理功能、射频处理及有源天线的相关功能。由于RRC层的信息最终会变成PHY层的信息,或者,由PHY层的信息转变而来,因而,在这种架构下,高层信令,如RRC层信令,也可以认为是由DU发送的,或者,由DU+AAU发送的。可以理解的是,网络设备可以为包括CU节点、DU节点、CU-CP节点、CU-UP节点、AAU节点中一项或多项的设备。此外,CU可以作为接入网中的网络设备,也可以作为核心网(core network,CN)中的网络设备,本申请对此不做限定。
3、UPF:是一种用户面网元,用于分组路由和转发、用户面数据的服务质量(quality of service,QoS)处理以及报文探测和策略规则执行等。
4、DN:用于提供传输数据的网络,例如,Internet网络等。其中,DN可以是数据网络鉴权、授权和计费(data network authentication、authorization、accounting),也可以是应用服务器(application function,AF)等。
5、AF:一种应用网元,主要传递应用侧对网络侧的需求,例如,服务质量(quality of service,QoS)需求等。AF可以是第三方功能实体,也可以是运营商部署的应用服务,如IP多媒体子系统(IP Multimedia Subsystem,IMS)语音呼叫业务。
6、AMF:一种接入管理网元,主要用于会话管理、UE的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理UPF网元、通过AMF实现与接入网相关的会话信息交互、策略控制和收费功能接口的终结点以及下行数据通知等。
7、NEF:一种网络开放网元,用于安全地向外部开放由3GPP网络功能提供的业务和能力等。
8、NRF:一种网络存储网元,用于保存网络功能实体以及其提供服务的描述信息,以及用于支持服务发现和网元实体发现等。
9、PCF:一种策略控制网元,用于指导网络行为的统一策略框架,为控制平面功能网元(例如AMF,SMF网元等)提供策略规则信息等。
10、UDM:一种数据管理网元,用于实现处理用户标识、接入鉴权、注册以及移动性管理等功能。
11、UDR:一种数据存储网元,主要负责签约数据、策略数据、应用数据等类型数据的存取功能。
可以理解的是,上述各网元既可以是硬件设备,也可以是芯片,或者是在专用硬件上运行软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。还应理解,图1中所示的一些网元可部署在同一位置(如同一硬件设备或软件功能上),也可以分开部署,本申请对此不作限定。
应理解,图1中所示的各网元之间的接口仅是一种示例,在实践中,网元之间的接口可能有所改变,比如,网元之间可以采用服务化接口进行通信。
还应理解,上述所涉及的接入管理网元、网络开放网元、策略控制网元、应用网元、数据存储网元等网元,在不同的系统中可能有不同的命名,比如接入管理网元在5G系统中命名为AMF,但在6G系统中可能不是AMF。本领域技术人员可以理解,网元命名的不同并不应对本申请构成任何限定。
为便于理解,下文中,以接入管理网元为AMF、网络开放网元为NEF、策略控制网元为PCF、应用网元为AF、数据存储网元为UDR为例,对本申请提供的方案进行说明。
现阶段,提出URSP需支持边缘计算业务。边缘计算业务可简单理解为,AF可选择在边缘位置动态部署应用服务,如体育场馆在重大赛事期间可通过部署直播/回放业务,实现该场馆区域内观众切换观看视角、回放精彩环节等功能,提升用户观看体验。通常而言,由于该业务需保证大带宽、低时延,该业务可能仅允许临近区域内的用户接入访问。
在接入特定业务时,终端设备需根据URSP规则选择正确的PDU会话配置参数,如DNN、S-NSSAI等信息,以便接入特定应用服务并获得相应的服务质量保障。然而,对于动态部署的应用服务而言,由于任何用户都有可能进入该区域,若为所有用户提前配置该URSP规则,而实际需要接入该业务的用户有限,则会造成信令资源的浪费。
为解决应用服务动态部署场景下URSP无法有效配置的问题,本申请提出了一种配置业务的方法。下面,对本申请提供的方案进行说明。应理解,本申请提供的方法的执行顺序仅由该方法内部逻辑决定,并不由各实施例对应的附图中的附图标记限定。
图2是本申请提供的一种配置业务的方法的示意性流程图。如图2所示,该方法200可以包括S210至S260。下面对各步骤分别说明。
S210,AMF根据第一区域信息,确定目标UE是否位于目标区域。
其中,第一区域信息用于指示目标区域。第一区域信息可以由AF通过NEF,配置给AMF。
目标UE可以是网络内任一UE,也可以是特定的一些UE,这些特定的UE可以由AF通过NEF配置给AMF。
S220,若目标UE位于目标区域,AMF向PCF发送用户策略关联请求消息。
其中,该用户策略关联请求消息用于请求PCF向目标UE配置第一URSP,第一URSP用于目标UE接入第一业务。示例性的,本申请中,用户策略关联请求消息可以是用户策略关联建立请求消息或用户策略关联更新请求消息。
应理解,目标UE位于目标区域可以指目标UE进入目标区域或者目标UE已经位于目标区域。
S230,PCF生成第一URSP。
PCF可以根据应用标识生成第一URSP,其中,应用标识所指示的应用提供第一业务,或者说该应用标识用于指示提供第一业务的应用。
示例性的,本申请中,所述应用标识可以是应用服务提供商(application service Provider,ASP)标识(identifier,ID),所述ASP ID指示的应用服务提供商ASP提供所述第一业务。或者,所述应用标识可以是应用业务标识(AF Service Identifier),或者还可以是具体的应用标识信息。
下文中,为便于理解,均以ASP ID代替应用标识来描述。
示例性的,第一URSP可以包括流描述(traffic descriptor,TD)信息和路由选择描述 (route selection descriptor)信息。
其中,流描述信息用于描述第一业务的业务流,可以是第一业务对应的APP ID或IP三元组(目的地址、目的端口号、协议类型),也可以是域名描述信息等,具体形式可参考现有技术URSP里的流描述的形式。应理解,前述应用标识可以理解为运营商和ASP之间有一致概念的应用标识;而这里APP ID则可以理解为UE与运营商之间有一致概念的应用标识,例如,APP ID可以是该ASP所提供的某一个子应用。
路由选择描述信息可以包括下述中的一项或多项:
(1)时间窗(time window,TW)信息。该时间窗信息可看作路由选择描述信息的时间验证条件,用于指示该路由选择描述信息的有效时间,即只有在该时间窗内,该路由选择描述信息才被认为有效。
(2)第一区域信息。该区域信息可看作路由选择描述信息的位置验证条件,用于指示该路由选择描述信息的有效位置,即只有在该区域内,该路由选择描述信息才被认为有效。
(3)DNN和S-NSSAI。其中,DNN和S-NSSAI可以由NEF根据ASP ID和本地运营商配置信息得到,或者由PCF根据ASP ID和/或流描述信息及本地运营商配置信息或UDR中配置信息得到。
在一种实现方式中,用户策略关联请求消息可以包括ASP ID。可选地,用户策略关联请求消息还可以包括下述中的一项或多项:流描述信息、时间窗信息、第一区域信息、DNN和S-NSSAI。也就是说,可以由AMF提供ASP ID和流描述信息、时间窗信息、第一区域信息、DNN和S-NSSAI中的任一种。另外,若用户策略关联请求消息不包括DNN和S-NSSAI,PCF还可以根据ASP ID和/或流描述信息及本地运营商配置信息或UDR中配置信息确定DNN和S-NSSAI。
在另一种实现方式中,PCF可以从本地或UDR获取ASP ID。PCF还可以从本地或UDR获取流描述信息和/或时间窗信息,以及可以从本地、UDR获取或AMF处获取第一区域信息。其中PCF本地的上述信息和UDR中的上述信息是由AF通过NEF配置的。另外,NEF可以根据本地运营商配置信息对ASP ID映射得到DNN和S-NSSAI,从而PCF还可以从NEF获取该DNN和S-NSSAI。若NEF未执行ASP ID至DNN和S-NSSAI的映射动作,则PCF可以根据ASP ID和/或流描述信息及本地运营商配置信息或UDR中配置信息得到DNN和N-SSAI。
可选地,在一种实现方式中,在S220中,若在所述时间窗信息所指示的时间窗内,目标UE位于目标区域,则AMF向PCF发送用户策略关联请求消息。也就是说,如果目标UE在时间窗信息所指示的时间窗外位于目标区域,则AMF可以不向PCF发送用户策略关联请求消息。那么相应地,在S230中,PCF不需要判断AMF发送用户策略关联请求消息的时间是否在所述时间窗内。
可选地,在另一种具体实现中,在S220中,无论是否在时间窗信息所指示的时间窗内,只要目标UE位于目标区域中,AMF都可以向PCF发送用户策略关联请求消息。PCF可以根据接收到用户策略关联请求消息的时间,确定是否执行S230。如果PCF在时间窗信息所指示的时间窗内接收到用户策略关联请求消息,则执行S230,否则,不执行S230。另外,PCF也可以不判断AMF发送用户策略关联请求消息的时间是否在所述时间窗内, 而由UE根据URSP策略中的时间窗信息判断当前是否执行第一URSP策略。
S240,PCF向AMF发送第一URSP。
S250,AMF向目标UE发送第一URSP。
示例性的,PCF可以通过UE配置更新(UE Configuration Update)流程经由AMF将第一URSP发送给UE。
S260,目标UE根据第一URSP,接入第一业务。
具体地,目标UE收到第一URSP后,在发起该第一URSP所对应的第一业务时,将执行URSP匹配过程,并根据该第一业务所对应的流描述信息匹配至该第一URSP,随后根据所匹配的第一URSP中的路由选择描述信息发起PDU会话建立流程或PDU会话修改流程。
根据本申请提供的方法,目标UE在目标区域时,PCF才给UE配置第一URSP,从而使得目标UE只有在目标区域时,才能根据第一URSP接入相应的业务。相比于现有技术不关心目标UE的位置,提前为所有目标UE配置第一URSP的方案,本申请的方案能够有效配置URSP,避免不必要的信令开销。
应理解,对于在前文中已经进行解释说明的内容,下文中若无特殊说明,均可以参照上文的描述。
下面结合图3至图5所示的详细的流程图,对图2所示的方法进行更为具体地说明。
图3所示的方法中,AMF判断目标UE位于目标区域时,向PCF提供用于生成第一URSP的信息。与图3所示的方法的不同之处在于,图4所示的方法中,NEF将用于生成第一URSP的信息通知给PCF;图5所示的方法中,NEF将用于生成第一URSP的信息通知给UDR,再由UDR提供给PCF。图3所示的方法可以对应S230中描述的第一种方式,图4和图5所示的方法可以对应S230中描述的第二种方式。
图3是一种配置业务的方法的示意性流程图。如图3所示,该方法300可以包括S301至S314中的部分或全部步骤。下面对各步骤分别说明。
S301,AF向NEF发送第二配置请求消息。
例如,AF可以在部署新应用的情况下发送第二配置请求消息,如部署了虚拟现实(virtual reality,VR)体验场馆新增部署VR体验服务,通过发送第二配置请求消息允许馆内用户通过手机接入使用。为保障用户体验,该业务需通过特定DNN/S-NSSAI接入,即AF需在用户接入该体验服务前告知运营商将相应URSP配置至目标用户。再如,AF可以在ASP在特定本地接入数据网络(local access data network,LADN)新增应用接入点的情况下发送第二配置请求消息。ASP在特定LADN新增应用接入点,允许UE通过本地分支接入该应用服务以降低用户面路径环回,此时ASP即可通过运营商网络的URSP提供该LADN信息至UE,以便UE通过正确的LADN网络接入该应用服务。
第二业务配置请求消息用于配置目标UE在目标区域时接入第一业务。具体地,第二业务配置请求消息可以包括上述ASP ID和用于指示目标区域的信息(本申请中记为:第二区域信息)。第二区域信息可以是外部地理区域信息(Geo Info),但本申请对此不作限定。
可选地,第二配置请求消息还可以携带外部群组标识,该外部群组标识用于指示允许接入第一业务的所有目标UE。示例性的,若第二配置请求消息不包括外部群组标识,则 目标UE可以是网络内任一UE。
可选地,第二配置请求消息还可以包括下述中的一项或多项:
(1)上述流描述信息。
(2)上述时间窗信息。
(3)外部事务(external transaction)标识。外部事务标识用于唯一标识第一业务的配置请求,以便后续通过向NEF发送该外部事务标识,请求更新或取消第一业务的配置请求。第一业务的配置请求,即,与第一业务相关的配置信息或与第一业务相关的配置请求消息。
S302,NEF根据第二配置请求消息,执行第一业务配置授权。
具体地,NEF根据ASP ID判断该ASP ID所指示的ASP是否允许发送对第一业务的配置请求(即,第一配置请求消息),若允许,则将第二区域信息映射为下述中的一项或多项:运营商网络中的内部位置信息、小区标识列表(List of Cell id(s))、RAN设备列表(List of gNodeB(s))和跟踪区标识(tracking area identifier,TAI)列表(List of TAI(s))。由对第二区域信息映射得到的上述信息可以统称为:第一区域信息。容易理解,第一区域信息所指示的区域和第二区域信息所指示的区域相同,即都为目标区域。
若第二配置请求消息还包括所述外部群组标识,则NEF还可以将外部群组标识映射为内部群组标识(internal group identifier,IGI)。应理解,外部群组标识与内部群组标识所指示的UE相同。
若第二配置请求消息还包括所述外部事务标识,则NEF还可以将外部事务标识映射为内部事务标识(internal transaction identifier,ITI)。
可选地,NEF还可以根据运营商配置信息,将ASP ID映射为DNN和S-NSSAI。
S303,NEF获取为目标区域提供服务的AMF标识信息(或AMF集合信息)。
在一种方式中,NEF可以根据第二区域信息映射出AMF标识信息。
另一种实现方式中,NEF可以向UDM发送第一区域信息,UDM可以根据第一区域信息与AMF标识间的映射关系,判断为该区域提供服务的AMF标识信息,然后UDM可以将该AMF标识信息发送给NEF。
S304,NEF向AMF标识信息所标识的AMF发送第一配置请求消息。
第一配置请求消息包括ASP ID和第一区域信息。
可选地,若第二配置请求消息还包括流描述信息,则第一配置请求消息还可以包括该流描述信息。类似地,若第一配置请求消息还包括时间窗信息,则第一配置请求消息还可以包括该时间窗信息。若第二配置请求消息包括外部事务标识,则第一配置请求消息还可以包括内部事务标识。若第二配置请求消息包括外部群组标识,则第一配置请求消息还可以包括内部群组标识。
可选地,第一配置请求消息还可以包括DNN和S-NSSAI。
需要说明的是,NEF可以是拜访地网络所部署的中间NEF(Intermediate NEF,I-NEF),也可以是归属地网络的NEF。若该NEF为拜访地网络所部署的I-NEF,流程与非漫游场景基本一致。若该NEF为归属地网络的NEF,则NEF发送第二配置请求消息后,第二配置请求消息经由I-NEF转发该至拜访地网络的该AMF。
S305,AMF保存所接收到的第一配置请求消息。
S306,AMF向NEF发送第一响应消息。第一响应消息用于指示AMF成功接收第一配置请求消息。
S307,NEF向AF发送第二响应消息。第二响应消息用于指示NEF成功接收第二配置请求消息。
应理解,306和S307为可选步骤。S306和S307的执行顺序也不限定。另外,S307也可以在S302或S303之前执行。
S308,AMF判断目标UE是否位于目标区域。
具体地,AMF根据第一配置请求消息中的第一区域信息与所服务的目标UE的当前位置信息进行比对,若某一目标UE位于目标区域,则AMF将为该目标UE发起S309至S314所示流程,否则不发起该流程。可选地,若第一配置请求消息还包括时间窗信息,AMF也可以在时间窗信息所指示的时间窗内判断目标UE位于目标区域时,才为该目标UE发起S309至S314
可选地,当AMF在时间窗信息所指示的时间窗结束前收到目标UE的切换请求或注册请求消息时,若判断目标UE进入目标区域,则AMF将目标UE发起S309至S314所示流程。需要理解的是,AMF所收到的切换请求或注册请求中将携带目标UE当前位置信息,比如RAN设备列表/TAI信息等。
应理解,AMF上保存有其所服务的UE当前所在的RAN设备或TAI信息。
S309,AMF向PCF发送用户策略关联请求消息。
用户策略关联请求消息可以包括ASP ID。可选地,用户策略关联请求消息还可以包括下述中的一项或多项:流描述信息;时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
需要说明的是,在漫游场景下,在一种方式中,S309具体为:AMF发送用户策略关联请求消息至V-PCF。另一种方式中,S309具体为:AMF发送用户策略关联请求消息至V-PCF,然后由V-PCF将该用户策略关联请求消息转发至H-PCF。应理解,在漫游场景下,后续步骤中的PCF相应地可以是V-PCF或H-PCF。
S310,PCF向AMF发送第三响应消息。
第三响应消息用于指示PCF成功接收用户策略关联请求消息。应理解,S310为可选步骤。
S311,PCF根据用户策略关联请求消息,生成第一URSP。
S312~S314,与S240~S260相同,可以参照S240~S260。
根据本申请提供的方法,AF经由NEF向AMF下发第一业务相关的配置请求,AMF根据该配置请求为进入目标区域的目标UE发起用户策略关联请求至PCF,从而PCF可以及时更新目标UE上的URSP,为目标UE访问目标区域所部署的应用提供网络保障。
图4是一种配置业务的方法的示意性流程图。如图4所示,该方法400可以包括S401至S417中的部分或全部步骤。下面对各步骤分别说明。
S401~S402,与S301~S302相同,可以参照S301~S302。
S403,NEF向PCF发送策略配置请求消息。
策略配置请求消息可以包括ASP ID。可选地,策略配置请求消息还可以包括下述中的一项或多项:流描述信息;时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
示例性的,策略配置请求消息可以只发送至当前网络中的PCF节点(漫游场景下I-NEF发送至拜访地网络中的PCF节点,非漫游场景下NEF则发送至归属网络的PCF节点)。
S404,PCF保存所收到的策略配置信息。
应理解,策略配置信息即策略配置请求消息所包括的内容。
S405,PCF向NEF发送第四响应消息。
第四响应消息用于指示PCF成功接收策略配置请求消息。
S406,与S303相同,可以参照S303。
S407,NEF向AMF标识信息所标识的AMF发送第一配置请求消息。
步骤S407与S304类似,不同之处在于,在S407中,第一配置请求消息可以包括第一区域信息。
可选地,第一配置请求消息还可以包括下述中的一项或多项:ASP ID;流描述信息;时间窗信息;内部事务标识;DNN和S-NSSAI。
比如,第一配置请求消息可以包括ASP ID,或者第一配置请求消息可以内部事务标识,或者同时包括ASP ID和内部事务标识。
S408~S410,与S305~S307相同,可以参照S305~S307。
S411,AMF判断目标UE是否位于目标区域。
具体地,AMF根据第一配置请求消息中的第一区域信息与所服务的目标UE的当前位置信息进行比对,若某一目标UE位于目标区域,则AMF将为该目标UE发起S412至S417中的流程,否则不发起该流程。可选地,若第一配置请求消息还包括时间窗信息,则AMF在时间窗信息所指示的时间窗内判断目标UE位于目标区域,才为该目标UE发起S412至S417。
可选地,当AMF在时间窗信息所指示的时间窗结束前收到目标UE的切换请求或注册请求消息时,若判断目标UE进入目标区域,则AMF将目标UE发起S412至S417所示流程。需要理解的是,AMF所收到的切换请求或注册请求中将携带目标UE当前位置信息,比如RAN设备信息和/或TAI信息等。
应理解,AMF上保存有其所服务的UE当前所在的RAN设备信息和/或TAI信息。
S412,AMF向PCF发送用户策略关联请求消息。
用户策略关联请求消息可以包括内部事务标识和/或ASP ID。PCF可根据内部事务标识和/或ASP ID从本地保存的信息中获得所述策略配置信息,从而可以根据所述策略配置信息,并结合本地运营商配置信息,执行URSP决策,以生成第一URSP。应理解,若PCF根据内部事务标识获取所述策略配置信息,则所述策略配置信息还包括所述内部事务标识。
可选地,该用户策略关联请求消息还可以包括下述中的一项或多项:时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
需要说明的是,在漫游场景下,在一种方式中,S412具体为:AMF发送用户策略关联请求消息至V-PCF。另一种方式中,S412具体为:AMF发送用户策略关联请求消息至V-PCF,然后由V-PCF将该用户策略关联请求消息转发至H-PCF。应理解,在漫游场景下,后续步骤中的PCF相应地可以是V-PCF或H-PCF。
S413,PCF向AMF发送第三响应消息。
第三响应消息用于指示PCF成功接收用户策略关联请求消息。应理解,S413为可选步骤。
S414,PCF根据用户策略关联请求消息和所保存的策略配置信息,生成第一URSP。
S415~S417,与S240~S260相同,可以参照S240~S260。
根据本申请提供的方法,AF经由NEF向运营商网络内的特定PCF节点(也可以是网络中的所有PCF节点,或是支持接入与移动性策略决策的PCF节点)下发URSP决策所需信息(即,策略配置信息),向AMF下发业务相关的配置请求,AMF根据该配置请求为进入目标区域的目标UE发起用户策略关联请求至PCF,从而PCF可以及时更新目标UE上的URSP,为目标UE访问目标区域所部署的应用提供网络保障。
图5是一种配置业务的方法的示意性流程图。如图5所示,该方法500可以包括S501至S518中的部分或全部步骤。下面对各步骤分别说明。
S501~S502,与S301~S302相同,可以参照S301~S302。
S503,NEF向UDR发送策略配置请求消息。
策略配置请求消息可以包括ASP ID。可选地,策略配置请求消息还可以包括下述中的一项或多项:流描述信息;时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
示例性的,NEF可以将策略配置请求消息中的内容,即策略配置信息,作为应用信息(Application Data)保存至UDR,后续PCF可以根据内部事务标识或是ASP ID从UDR中获取策略配置信息,或者,UDR可以将该策略配置信息推送给PCF。可选地,PCF获取到策略配置信息后,可以将该策略配置信息保存起来以供后续使用。
S504,UDR保存策略配置信息。
S505,UDR向NEF发送第五响应消息。
第五响应消息用于指示UDR成功接收策略配置请求消息。应理解,S505为可选步骤。
S506~511,与S406~S411相同,可以参照S406~S411。
应理解,S510可以在S501或S502之后的任一时间执行。
S512,AMF向PCF发送用户策略关联请求消息。
用户策略关联请求消息可以包括内部事务标识和/或ASP ID。
可选地,该用户策略关联请求消息还可以包括下述中的一项或多项:时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
需要说明的是,在漫游场景下,在一种方式中,S512具体为:AMF发送用户策略关联请求消息至V-PCF。另一种方式中,S512具体为:AMF发送用户策略关联请求消息至V-PCF,然后由V-PCF将该用户策略关联请求消息转发至H-PCF。应理解,在漫游场景下,后续步骤中的PCF相应地可以是V-PCF或H-PCF。
S513,PCF向AMF发送第三响应消息。
第三响应消息用于指示PCF成功接收用户策略关联请求消息。应理解,S513为可选步骤。
S514,PCF根据用户策略关联请求消息,从UDR中获取策略配置信息。
PCF可根据内部事务标识和/或ASP ID从UDR中获得所述策略配置信息,或者PCF可根据内部事务标识和/或ASP ID,从UDR推送给PCF的信息中获取所述策略配置信息,并可以进一步根据所述策略配置信息,并结合本地运营商配置信息,生成第一URSP。应 理解,若PCF根据内部事务标识从UDR获取所述策略配置信息,则所述策略配置信息还包括所述内部事务标识。
S515,PCF根据策略配置信息,生成第一URSP。
S516~S518,与S240~S260相同,可以参照S240~S260。
根据本申请提供的方法,AF经由NEF向UDR下发策略配置信息,向AMF下发业务相关的配置请求,AMF根据该配置请求为进入目标区域的目标UE发起用户策略关联请求至PCF,PCF可根据从UDR获得的策略配置信息,及时更新目标UE上的URSP,为目标UE访问目标区域所部署的应用提供网络保障。
图6是本申请提供的另一种配置业务的方法。前述方法中,由AMF判断目标UE是否位于目标区域,该方法中由PCF判断目标UE是否位于目标区域。如图6所示,该方法600可以包括S601至S610中的部分或全部步骤。下面对各步骤分别说明。
S601~S602,与S301~S302相同,可以参照S301~S302。
S603,NEF向本网络中全部PCF或部分具有用户策略决策功能的PCF或支持为该区域提供服务的PCF发送策略配置请求消息。
PCF收到策略配置请求消息后,保存策略配置请求消息中的内容,即策略配置信息。策略配置信息包括第一区域信息和ASP ID。
可选地,该策略配置请求消息还可以包括下述中的一项或多项:流描述信息;时间窗信息;第一区域信息;内部事务标识;DNN和S-NSSAI。
作为S603的一种替换方式,NEF也可以向UDR发送该策略配置请求消息。相应地,执行下述中的S607步骤之前,先要从UDR中获取该策略配置请求消息中的策略配置信息。一种方式中,PCF可以在接收到AMF发送的位置指示信息时,从UDR中获取该策略配置信息。另一种方式中,UDR可以将该策略配置信息主动推送给PCF。
S604,NEF向AF发送第二响应消息。第二响应消息用于指示NEF成功接收第二配置请求消息。
应理解,S604为可选步骤。
S605,AMF向PCF发送位置指示信息。
该位置指示信息用于指示目标UE的当前位置,或者,该位置指示信息用于指示目标UE进入或离开目标区域。
可选地,S605具体可以通过两种方式实现:
方式一:目标UE发起注册请求和/或切换请求时,向PCF发送策略控制请求消息,该策略控制请求消息包括所述位置指示信息。示例性的,该策略控制请求消息为策略控制建立请求消息或策略控制更新请求消息。
方式二:PCF可向AMF订阅UE位置变更事件,比如订阅UE进入目标区域的事件。那么,UE进入目标区域时,AMF将将PCF发送所述位置指示信息。可选地,PCF可以仅订阅目标UE的位置并更事件。
以PCF订阅目标UE的位置并更事件为例,PCF向AMF订阅目标UE位置变更事件的流程可以包括:PCF向AMF发送事件订阅请求消息,该事件订阅请求消息用于订阅目标UE在目标区域的位置变更事件。那么,目标UE进入目标区域时,AMF向PCF发送所述位置指示信息。
S606,PCF根据该位置指示信息,判断目标UE会否位于目标区域。
若该UE位于目标区域,则执行S607,否则不执行S607以及后续步骤。
S607,PCF根据策略配置信息,生成第一URSP。
比如,PCF可以根据策略配置信息和本地配置信息,确定流描述信息和用户选择描述信息,从而可以生成第一URSP。
S608~S610,与S240~S260相同,可以参照S240~S260。
根据本申请提供的方法,AMF无需感知第一业务的相关配置过程,PCF直接根据AMF所提供的位置信息判断目标UE是否在目标区域,若目标UE位于目标区域内,PCF执行用户策略决策并提供更新后的URSP策略规则至目标UE,从而能够为目标UE访问目标区域所部署的应用提供网络保障。
以上,结合图2至图6详细说明了本申请实施例提供的方法。以下,结合图7至图9详细说明本申请实施例提供的装置。
图7是本申请实施例提供的通信装置的示意性框图。如图7所示,该通信装置700可以包括收发单元710和处理单元720。
其中,收发单元710可以用于接收其他装置发送的信息(或消息),还可以用于向其他装置发送信息(或消息)。比如,发送或接收用户策略关联请求消息。处理单元720可以用于进行装置的内部处理,比如生成第一URSP。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的AMF,如该通信装置1700可以是AMF,也可以是AMF中的芯片。该通信装置700可以包括用于执行上述方法实施例中由AMF所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由AMF所执行的操作。
示例性的,在一种实现方式中,收发单元710可以用于:接收来自于网络开放网元(如NEF)的第一配置请求消息,所述第一配置请求消息包括第一区域信息,所述第一区域信息用于指示目标区域;若所述处理单元720确定目标终端设备位于所述目标区域,向策略控制网元发送用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向所述目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于所述目标终端设备接入第一业务;接收来自于所述策略控制网元的所述第一URSP,并向所述目标终端设备(如,目标UE)发送所述第一URSP。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的PCF,如该通信装置700可以是PCF,也可以是PCF中的芯片。该通信装置700可以包括用于执行上述方法实施例中由PCF所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由PCF所执行的操作。
示例性的,在一种实现方式中,所述收发单元710用于,接收来自于接入管理网元(如,AMF)的用户策略关联请求消息,所述用户策略关联请求消息包括应用标识,所述应用标识用于指示提供提供第一业务的应用;所述处理单元720用于,根据所述用户策略关联请求消息,生成第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务;所述收发单元710还用于,向所述目标终端设备(如,目标UE)发送所述第一URSP。
在另一种实现方式中,所述收发单元710用于,获取策略配置信息,所述策略配置信 息包括应用标识,所述应用标识用于指示提供第一业务的应用;所述收发单元710还用于,接收来自于接入管理网元(如,AMF)的用户策略关联请求消息,所述用户策略关联请求消息用于请求所述装置向目标终端设备(如,目标UE)配置第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务,所述目标终端设备位于目标区域;所述处理单元720用于,根据所述策略配置信息,生成所述第一URSP;所述收发单元710还用于,向所述目标终端设备发送所述第一URSP。
在又一种实现方式中,所述收发单元710用于,获取策略配置信息,所述策略配置信息包括第一区域信息和应用标识,所述第一区域信息用于指示目标区域,所述应用标识用于指示提供第一业务的应用;所述收发单元710还用于,接收来自于接入管理网元的位置指示信息;所述处理单元720用于,若根据所述位置指示信息,确定所述目标终端设备位于所述目标区域,则根据所述策略配置信息,生成第一用户路由选择策略URSP;所述收发单元710还用于,向所述目标终端设备发送所述第一URSP,所述第一URSP用于所述目标终端设备接入所述第一业务。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的NEF,如该通信装置700可以是NEF,也可以是NEF中的芯片。该通信装置700可以包括用于执行上述方法实施例中由NEF所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由NEF所执行的操作。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的AF,如该通信装置700可以是AF,也可以是AF中的芯片。该通信装置700可以包括用于执行上述方法实施例中由AF所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由AF所执行的操作。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的UDR,如该通信装置700可以是UDR,也可以是UDR中的芯片。该通信装置700可以包括用于执行上述方法实施例中由UDR所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由UDR所执行的操作。
在一种可能的设计中,该通信装置700可对应于上述方法实施例中的目标UE,如该通信装置700可以是目标UE,也可以是目标UE中的芯片。该通信装置700可以包括用于执行上述方法实施例中由目标UE所执行的操作的单元,并且,该通信装置700中的各单元分别为了实现上述方法实施例中由目标UE所执行的操作。
应理解,该通信装置目标700为UE时,该通信装置700中的收发单元710可对应于图8中示出的终端设备2000中的收发器2020,该通信装置700中的处理单元720可对应于图8中示出的终端设备2000中的处理器2010。
还应理解,该通信装置700为配置于UE中的芯片时,该通信装置700中的收发单元710可以为输入/输出接口。
应理解,该通信装置700对应AMF、PCF、AF、NEF以及UDR中的任一网元时,该通信装置700中的收发单元710可对应于图9中示出的通信接口3010,处理单元720可对应于图9中示出的处理器3020。
图8是本申请实施例提供的终端设备2000的结构示意图。该终端设备2000可应用于如图1所示的系统中,执行上述方法实施例中目标UE的功能。如图8所示,该终端设备 2000包括处理器2010和收发器2020。可选地,该终端设备2000还包括存储器2030。其中,处理器2010、收发器2002和存储器2030之间可以通过内部连接通路互相通信,传递控制或数据信号,该存储器2030用于存储计算机程序,该处理器2010用于从该存储器2030中调用并运行该计算机程序,以控制该收发器2020收发信号。可选地,终端设备2000还可以包括天线2040,用于将收发器2020输出的上行数据或上行控制信令通过无线信号发送出去。
上述处理器2010可以和存储器2030可以合成一个处理装置,处理器2010用于执行存储器2030中存储的程序代码来实现上述功能。具体实现时,该存储器2030也可以集成在处理器2010中,或者独立于处理器2010。该处理器2010可以与图7中的处理单元对应。
上述收发器2020可以与图7中的收发单元对应。收发器2020可以包括接收器(或称接收机、接收电路)和发射器(或称发射机、发射电路)。其中,接收器用于接收信号,发射器用于发射信号。
应理解,图8所示的终端设备2000能够实现上述方法实施例中任一方法实施例中涉及目标UE的各个过程。终端设备2000中的各个模块的操作或功能,分别为了实现上述方法实施例中的相应流程。具体可参见上述方法实施例中的描述,为避免重复,此处适当省略详细描述。
上述处理器2010可以用于执行前面方法实施例中描述的由目标UE内部实现的动作,而收发器2020可以用于执行前面方法实施例中描述的目标UE向其他网元发送或从其他网元接收的动作。具体请见前面方法实施例中的描述,此处不再赘述。
可选地,上述终端设备2000还可以包括电源2050,用于给终端设备中的各种器件或电路提供电源。
除此之外,为了使得终端设备的功能更加完善,该终端设备2000还可以包括输入单元2060、显示单元2070、音频电路2080、摄像头2090和传感器2100等中的一个或多个,所述音频电路还可以包括扬声器2082、麦克风2084等。
图9图是本申请一个实施例的通信装置的示意性结构图。应理解,图9示出的通信装置3000仅是示例,本申请实施例的通信装置还可包括其他模块或单元,或者包括与图9中的各个模块的功能相似的模块,或者并非要包括图9中所有模块。
通信装置3000包括通信接口3010和至少一个处理器3020。
该通信装置3000可以对应AMF、PCF、AF、NEF以及UDR中的任一网元。示例性的,至少一个处理器3020可以用于执行前面方法实施例中描述的由相应网元内部实现的动作,而收发器2020可以用于执行前面方法实施例中描述的相应网元向其他网元发送或从其他网元接收的动作。具体请见前面方法实施例中的描述,此处不再赘述。示例性的,至少一个处理器3020执行程序指令,使得通信装置3000实现上述方法实施例中由对应网元所执行的方法的相应流程。
可选地,通信装置3000还可以包括存储器。该存储器可以存储程序指令,至少一个处理器3020可以读取存储器所存储的程序指令并执行该程序指令。
本申请实施例中的处理器可以是中央处理单元(Central Processing Unit,CPU),该处理器还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用 集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
根据本申请实施例提供的方法,本申请还提供一种计算机程序产品,该计算机程序产品包括:计算机程序代码,当该计算机程序代码在计算机上运行时,使得该计算机执行前述方法实施例中涉及的任一网元对应的方法。
根据本申请实施例提供的方法,本申请还提供一种系统,其包括前述的目标UE、AMF、PCF、AF、NEF以及UDR中的至少一项。
本申请实施例还提供了一种处理装置,包括处理器和接口;所述处理器用于执行上述任一方法实施例中的方法。
应理解,上述处理装置可以是一个芯片。例如,该处理装置可以是现场可编程门阵列(field programmable gate array,FPGA),可以是通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,还可以是系统芯片(system on chip,SoC),还可以是中央处理器(central processor unit,CPU),还可以是网络处理器(network processor,NP),还可以是数字信号处理电路(digital signal processor,DSP),还可以是微控制器(micro controller unit,MCU),还可以是可编程控制器(programmable logic device,PLD)或其他集成芯片。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产 品包括一个或多个计算机指令。在计算机上加载和执行所述计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,高密度数字视频光盘(digital video disc,DVD))、或者半导体介质(例如,固态硬盘(solid state disc,SSD))等。
上述各个装置实施例中网络设备与终端设备和方法实施例中的网络设备或终端设备完全对应,由相应的模块或单元执行相应的步骤,例如通信单元(收发器)执行方法实施例中接收或发送的步骤,除发送、接收外的其它步骤可以由处理单元(处理器)执行。具体单元的功能可以参考相应的方法实施例。其中,处理器可以为一个或多个。
在本说明书中使用的术语“部件”、“模块”、“系统”等用于表示计算机相关的实体、硬件、固件、硬件和软件的组合、软件、或执行中的软件。例如,部件可以是但不限于,在处理器上运行的进程、处理器、对象、可执行文件、执行线程、程序或计算机。通过图示,在计算设备上运行的应用和计算设备都可以是部件。一个或多个部件可驻留在进程或执行线程中,部件可位于一个计算机上或分布在2个或更多个计算机之间。此外,这些部件可从在上面存储有各种数据结构的各种计算机可读介质执行。部件可例如根据具有一个或多个数据分组(例如来自与本地系统、分布式系统或网络间的另一部件交互的二个部件的数据,例如通过信号与其它系统交互的互联网)的信号通过本地或远程进程来通信。
应理解,说明书通篇中提到的“实施例”意味着与实施例有关的特定特征、结构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各个实施例未必一定指相同的实施例。此外,这些特定的特征、结构或特性可以任意适合的方式结合在一个或多个实施例中。
应理解,在本申请实施例中,编号“第一”、“第二”…仅仅为了区分不同的对象,比如为了区分不同的网络设备,并不对本申请实施例的范围构成限制,本申请实施例并不限于此。
还应理解,在本申请中,“当…时”、“若”以及“如果”均指在某种客观情况下网元会做出相应的处理,并非是限定时间,且也不要求网元实现时一定要有判断的动作,也不意味着存在其它限定。
还应理解,在本申请各实施例中,“A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其它信息确定B。
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本申请中出现的类似于“项目包括如下中的一项或多项:A,B,以及C”表述的含义,如无特别说明,通常是指该项目可以为如下中任一个:A;B;C;A和B;A和C;B和C;A,B和C;A和A;A,A和A;A,A和B;A,A和C,A,B和B;A,C和C;B和B,B,B和B,B,B和C,C和C;C,C和C,以及其他A,B和C的组合。以上是以A,B和C共3个元素进行举例来说明该项目的可选用条目,当表达为“项目包括如下中至少一种:A,B,……,以及X”时,即表达中具有更多元素时,那么该项目可以适用的条目也可以按照前述规则获得。
可以理解的,本申请实施例中,终端设备和/或网络设备可以执行本申请实施例中的部分或全部步骤,这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或者各种操作的变形。此外,各个步骤可以按照本申请实施例呈现的不同的顺序来执行,并且有可能并非要执行本申请实施例中的全部操作。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (31)
- 一种配置业务的方法,其特征在于,包括:接入管理网元接收来自于网络开放网元的第一配置请求消息,所述第一配置请求消息包括第一区域信息,所述第一区域信息用于指示目标区域;若目标终端设备位于所述目标区域,所述接入管理网元向策略控制网元发送用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向所述目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于所述目标终端设备接入第一业务;所述接入管理网元接收来自于所述策略控制网元的所述第一URSP,并向所述目标终端设备发送所述第一URSP。
- 如权利要求1所述的方法,其特征在于,所述第一配置请求消息和所述用户策略关联请求消息均还包括应用标识,所述应用标识用于指示提供所述第一业务的应用。
- 如权利要求2所述的方法,其特征在于,所述第一配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;相应地,所述用户策略关联请求消息还包括下述中的一种或多种:流描述信息、时间窗信息、所述第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是所述网络开放网元根据所述应用标识确定的。
- 如权利要求1所述的方法,其特征在于,所述第一配置请求消息和所述用户策略关联请求消息均包括应用标识和内部事务标识,或者,所述第一配置请求消息和所述用户策略关联请求消息均包括内部事务标识,其中,所述应用标识用于指示提供所述第一业务的应用,所述内部事务标识用于标识所述第一业务的配置请求。
- 一种配置业务的方法,其特征在于,包括:策略控制网元获取策略配置信息,所述策略配置信息包括应用标识,所述应用标识用于指示提供第一业务的应用;所述策略控制网元接收来自于接入管理网元的用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务,所述目标终端设备位于目标区域;所述策略控制网元根据所述策略配置信息,生成所述第一URSP;所述策略控制网元向所述目标终端设备发送所述第一URSP。
- 如权利要求5所述的方法,其特征在于,所述策略控制网元获取策略配置信息, 包括:所述策略控制网元从网络开放网元接收策略配置请求消息,所述策略配置请求消息包括所述策略配置信息;或者,所述策略控制网元从数据存储网元中获取所述策略配置信息。
- 如权利要求5或6所述的方法,其特征在于,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述第一区域信息用于指示目标区域,所述目标区域为允许所述目标终端设备接入所述第一业务的区域;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
- 如权利要求5至7中任一项所述的方法,其特征在于,所述用户策略关联请求消息包括所述应用标识和内部事务标识,或者,所述用户策略关联请求消息包括内部事务标识,所述内部事务标识用于标识所述第一业务的配置请求。
- 一种配置业务的方法,其特征在于,包括:策略控制网元获取策略配置信息,所述策略配置信息包括第一区域信息和应用标识,所述第一区域信息用于指示目标区域,所述应用标识用于指示提供第一业务的应用;所述策略控制网元接收来自于接入管理网元的位置指示信息;所述策略控制网元根据所述位置指示信息,若确定目标终端设备位于所述目标区域,根据所述策略配置信息,生成第一用户路由选择策略URSP;所述策略控制网元向所述目标终端设备发送所述第一URSP,所述第一URSP用于所述目标终端设备接入所述第一业务。
- 如权利要求9所述的方法,其特征在于,所述位置指示信息用于指示目标终端设备的当前位置,或者,所述位置指示信息用于指示所述目标终端设备进入或者离开所述目标区域。
- 如权利要求9或10所述的方法,其特征在于,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于所述描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
- 如权利要求9至11中任一项所述的方法,其特征在于,所述策略控制网元获取策略配置信息,包括:所述策略控制网元从网络开放网元接收第一配置请求消息,所述第一配置请求消息包 括所述策略配置信息;或者,所述策略控制网元从数据存储网元中获取所述策略配置信息。
- 如权利要求9至12中任一项所述的方法,其特征在于,所述位置指示信息用于指示所述目标终端设备的当前位置;其中,所述策略控制网元从接入管理网元接收位置指示信息,包括:所述策略控制网元从所述接入管理网元接收策略控制请求消息,所述策略控制请求消息包括所述位置指示信息,所述策略控制请求消息为策略控制建立请求消息或策略控制更新请求消息。
- 如权利要求9至12中任一项所述的方法,其特征在于,所述位置指示信息用于指示所述目标终端设备进入或者离开所述目标区域;以及,在所述策略控制网元从接入管理网元接收位置指示信息之前,所述方法还包括:所述策略控制网元向所述接入管理网元发送事件订阅请求消息,所述事件订阅请求消息用于指示所述目标终端设备在进入或者离开所述目标区域时,向所述策略控制网元发送位置指示信息。
- 一种通信装置,其特征在于,包括:收发单元和处理单元;所述收发单元用于,接收来自于网络开放网元的第一配置请求消息,所述第一配置请求消息包括第一区域信息,所述第一区域信息用于指示目标区域;所述收发单元还用于,若所述处理单元确定目标终端设备位于所述目标区域,向策略控制网元发送用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向所述目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于所述目标终端设备接入第一业务;所述收发单元还用于,接收来自于所述策略控制网元的所述第一URSP,并向所述目标终端设备发送所述第一URSP。
- 如权利要求15所述的装置,其特征在于,所述第一配置请求消息和所述用户策略关联请求消息均还包括应用标识,所述应用标识用于指示提供所述第一业务的应用。
- 如权利要求16所述的装置,其特征在于,所述第一配置请求消息还包括下述中的一种或多种:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;相应地,所述用户策略关联请求消息还包括下述中的一种或多种:流描述信息、时间窗信息、所述第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是所述网络开放网元根据所述应用标识确定的。
- 如权利要求15所述的装置,其特征在于,所述第一配置请求消息和所述用户策略关联请求消息均包括应用标识和内部事务标识,或者,所述第一配置请求消息和所述用户策略关联请求消息均包括内部事务标识,其中,所述应用标识用于指示提供所述第一业 务的应用,所述内部事务标识用于标识所述第一业务的配置请求。
- 一种通信装置,其特征在于,包括:收发单元和处理单元;所述收发单元用于,获取策略配置信息,所述策略配置信息包括应用标识,所述应用标识用于指示提供第一业务的应用;所述收发单元还用于,接收来自于接入管理网元的用户策略关联请求消息,所述用户策略关联请求消息用于请求所述装置向目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于目标终端设备接入所述第一业务,所述目标终端设备位于目标区域;所述处理单元用于,根据所述策略配置信息,生成所述第一URSP;所述收发单元还用于,向所述目标终端设备发送所述第一URSP。
- 如权利要求19所述的装置,其特征在于,所述收发单元具体用于:从网络开放网元接收策略配置请求消息,所述策略配置请求消息包括所述策略配置信息;或者,从数据存储网元中获取所述策略配置信息。
- 如权利要求19或20所述的装置,其特征在于,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、第一区域信息、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述第一区域信息用于指示目标区域,所述目标区域为允许所述目标终端设备接入所述第一业务的区域;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
- 如权利要求19至21中任一项所述的装置,其特征在于,所述用户策略关联请求消息包括所述应用标识和内部事务标识,或者,所述用户策略关联请求消息包括内部事务标识,所述内部事务标识用于标识所述第一业务的配置请求。
- 一种通信装置,其特征在于,包括:收发单元和处理单元;所述收发单元用于,获取策略配置信息,所述策略配置信息包括第一区域信息和应用标识,所述第一区域信息用于指示目标区域,所述应用标识用于指示提供第一业务的应用;所述收发单元还用于,接收来自于接入管理网元的位置指示信息;所述处理单元用于,若根据所述位置指示信息,确定目标终端设备位于所述目标区域,则根据所述策略配置信息,生成第一用户路由选择策略URSP;所述收发单元还用于,向所述目标终端设备发送所述第一URSP,所述第一URSP用于所述目标终端设备接入所述第一业务。
- 如权利要求23所述的装置,其特征在于,所述策略配置信息还包括下述中的一项或多项:内部群组标识、流描述信息、时间窗信息、内部事务标识、数据网络名称DNN以及单个网络切片选择辅助信息S-NSSAI;其中,所述内部群组标识用于指示允许接入所述第一业务的所有目标终端设备;所述流描述信息用于所述描述所述第一业务;所述时间窗信息用于指示所述第一业务的可用时间;所述内部事务标识用于标识所述第一业务的配置请求;所述DNN和所述S-NSSAI是根据所述应用标识确定的。
- 如权利要求23或24所述的装置,其特征在于,所述收发单元具体用于:从网络开放网元接收第一配置请求消息,所述第一配置请求消息包括所述策略配置信息;或者,从数据存储网元中获取所述策略配置信息。
- 如权利要求23至25中任一项所述的装置,其特征在于,所述位置指示信息用于指示所述目标终端设备进入或者离开所述目标区域;以及,所述收发单元还用于:向所述接入管理网元发送事件订阅请求消息,所述事件订阅请求消息用于指示所述目标终端设备在进入或者离开所述目标区域时,向所述装置发送位置指示信息。
- 一种通信系统,其特征在于,包括接入管理网元和策略控制网元;接入管理网元用于,在确定目标终端设备位于目标区域的情况下,向策略控制网元发送用户策略关联请求消息,所述用户策略关联请求消息用于请求所述策略控制网元向所述目标终端设备配置第一用户路由选择策略URSP,所述第一URSP用于所述目标终端设备接入第一业务;所述策略控制网元用于,根据所述用户策略关联请求消息,生成所述第一URSP,并向所述接入管理网元发送所述第一URSP;所述接入管理网元还用于,向所述目标终端设备发送所述第一URSP。
- 如权利要求27所述的系统,其特征在于,所述系统还包括网络开放网元,所述网络开放网元用于,向接入管理网元发送第一配置请求消息,所述第一配置请求消息包括第一区域信息,所述第一区域信息用于指示所述目标区域。
- 如权利要求28所述的系统,其特征在于,所述网络开放网元还用于,向所述策略控制网元发送策略配置请求消息,所述策略配置请求消息用于请求所述第一业务的策略配置,所述策略配置请求消息包括所述第一业务的策略配置信息;其中,所述策略控制网元用于,根据所述用户策略关联请求消息,生成所述第一URSP,包括:所述策略控制网元用于,根据所述用户策略关联请求消息和所述策略配置信息,生成所述第一URSP。
- 一种通信装置,其特征在于,所述装置用于执行如权利要求1至4中任一项、5至8中任一项、或9至14中任一项所述的方法。
- 一种计算机可读存储介质,其上存储有计算机程序或指令,其特征在于,所述计算机程序或指令被执行时使得计算机执行如权利要求1至14中任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20867686.6A EP4027684A4 (en) | 2019-09-26 | 2020-09-23 | SERVICE CONFIGURATION METHOD, COMMUNICATION DEVICE AND COMMUNICATION SYSTEM |
US17/656,489 US20220217611A1 (en) | 2019-09-26 | 2022-03-25 | Service Configuration Method, Communication Apparatus, and Communication System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910918864.4 | 2019-09-26 | ||
CN201910918864.4A CN112566149B (zh) | 2019-09-26 | 2019-09-26 | 配置业务的方法、通信装置和通信系统 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/656,489 Continuation US20220217611A1 (en) | 2019-09-26 | 2022-03-25 | Service Configuration Method, Communication Apparatus, and Communication System |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021057794A1 true WO2021057794A1 (zh) | 2021-04-01 |
Family
ID=75030017
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/117149 WO2021057794A1 (zh) | 2019-09-26 | 2020-09-23 | 配置业务的方法、通信装置和通信系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220217611A1 (zh) |
EP (1) | EP4027684A4 (zh) |
CN (1) | CN112566149B (zh) |
WO (1) | WO2021057794A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023000948A1 (zh) * | 2021-07-19 | 2023-01-26 | 腾讯科技(深圳)有限公司 | 一种电竞数据处理方法、装置、设备及存储介质 |
WO2023141167A1 (en) * | 2022-01-19 | 2023-07-27 | Innopeak Technology, Inc. | Application group data transfer support based on group quality-of-service policy |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11622323B2 (en) * | 2020-03-27 | 2023-04-04 | Qualcomm Incorporated | Slice allocation and interface to applications |
CN115442792A (zh) * | 2021-06-03 | 2022-12-06 | 华为技术有限公司 | 接入业务的方法、装置和系统 |
CN115499807A (zh) * | 2021-06-18 | 2022-12-20 | 中兴通讯股份有限公司 | 网元配置方法、业务配置方法、网元、存储介质 |
CN113179518B (zh) * | 2021-06-30 | 2021-10-26 | 中移(上海)信息通信科技有限公司 | 一种数据传输方法、数据传输装置、数据传输设备及终端 |
CN115884134A (zh) * | 2021-09-28 | 2023-03-31 | 华为技术有限公司 | 一种通信方法及通信装置 |
CN115460342B (zh) * | 2022-07-29 | 2024-02-27 | 浙江大华技术股份有限公司 | 相机设备的业务设置方法、装置和多路相机联动系统 |
KR20240044916A (ko) * | 2022-09-29 | 2024-04-05 | 삼성전자주식회사 | 무선 통신 시스템에서 제한된 pdu 세션에 대한 정책 제어를 위한 방법 및 장치 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109286567A (zh) * | 2018-11-23 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 路由选择策略的获取方法、装置及设备 |
WO2019035614A1 (en) * | 2017-08-14 | 2019-02-21 | Samsung Electronics Co., Ltd. | ANCHOR USER PLAN (UPF) FUNCTION PROCESSING METHOD FOR LOCAL DELIVERY IN A 5G CELLULAR NETWORK |
CN110049533A (zh) * | 2018-01-15 | 2019-07-23 | 华为技术有限公司 | 一种本地数据网络的指示方法及装置 |
US20190268835A1 (en) * | 2018-05-18 | 2019-08-29 | Intel Corporation | Ue indication to pcf whether or not to send ue policy |
CN110247849A (zh) * | 2019-05-28 | 2019-09-17 | 中国联合网络通信集团有限公司 | Ursp的更新方法和装置 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102638886B (zh) * | 2011-02-14 | 2016-09-28 | 中兴通讯股份有限公司 | 小区位置信息提供方法、装置及系统 |
WO2016005005A1 (en) * | 2014-07-11 | 2016-01-14 | Telefonaktiebolaget L M Ericsson (Publ) | A method, system and device for requesting services at a mobile network for one of a plurality of mobile user equipment |
KR102244049B1 (ko) * | 2016-08-22 | 2021-04-26 | 삼성전자 주식회사 | 무선 통신 네트워크에서 지역별 데이터 네트워크 구성을 위한 방법 및 시스템 |
US10856131B2 (en) * | 2017-01-16 | 2020-12-01 | Lg Electronics Inc. | Method for updating UE configuration in wireless communication system and apparatus for same |
WO2019028837A1 (zh) * | 2017-08-11 | 2019-02-14 | 华为技术有限公司 | Pdu类型的设置方法、ue策略的设置方法及相关实体 |
US10701587B2 (en) * | 2017-10-15 | 2020-06-30 | Qualcomm Incorporated | Policy provisioning at a user equipment (UE) |
AU2017440613A1 (en) * | 2017-11-21 | 2020-07-09 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Information transmission method, network device, and terminal device |
CN109862581B (zh) * | 2017-11-30 | 2022-05-17 | 华为技术有限公司 | 一种通信方法及装置 |
CN110149675B (zh) * | 2018-02-11 | 2020-12-04 | 大唐移动通信设备有限公司 | 一种upf选择方法和装置 |
US11019668B2 (en) * | 2018-04-09 | 2021-05-25 | Ofinno, Llc | PDU session establishment for cellular IoT |
US10506506B2 (en) * | 2018-04-30 | 2019-12-10 | Ofinno, Llc | 5G policy control for restricted local operator services |
US11044062B2 (en) * | 2018-07-13 | 2021-06-22 | Apple Inc. | Methods to determine parameters related to phase tracking reference signals (PT-RS) based on a type of radio network temporary identifier (RNTI) |
US11304092B2 (en) * | 2018-09-12 | 2022-04-12 | Ofinno, Llc | Session packet duplication control |
US10855851B2 (en) * | 2018-09-13 | 2020-12-01 | Ofinno, Llc | Charging control with SMF |
WO2021047551A1 (en) * | 2019-09-12 | 2021-03-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for flow control |
-
2019
- 2019-09-26 CN CN201910918864.4A patent/CN112566149B/zh active Active
-
2020
- 2020-09-23 WO PCT/CN2020/117149 patent/WO2021057794A1/zh unknown
- 2020-09-23 EP EP20867686.6A patent/EP4027684A4/en active Pending
-
2022
- 2022-03-25 US US17/656,489 patent/US20220217611A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019035614A1 (en) * | 2017-08-14 | 2019-02-21 | Samsung Electronics Co., Ltd. | ANCHOR USER PLAN (UPF) FUNCTION PROCESSING METHOD FOR LOCAL DELIVERY IN A 5G CELLULAR NETWORK |
CN110049533A (zh) * | 2018-01-15 | 2019-07-23 | 华为技术有限公司 | 一种本地数据网络的指示方法及装置 |
US20190268835A1 (en) * | 2018-05-18 | 2019-08-29 | Intel Corporation | Ue indication to pcf whether or not to send ue policy |
CN109286567A (zh) * | 2018-11-23 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 路由选择策略的获取方法、装置及设备 |
CN110247849A (zh) * | 2019-05-28 | 2019-09-17 | 中国联合网络通信集团有限公司 | Ursp的更新方法和装置 |
Non-Patent Citations (2)
Title |
---|
HUAWEI, HISILICON: "OI#4i, OI#4d/OI#32: Tailoring UE Support and Removing NSSP Terminology", 3GPP DRAFT; S2-179424 WAS 9344-8835 - UE SUPPORT AND NSSP TERMINOLOGY, vol. SA WG2, 30 November 2017 (2017-11-30), Reno, U.S. of America, pages 1 - 14, XP051365901 * |
See also references of EP4027684A4 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023000948A1 (zh) * | 2021-07-19 | 2023-01-26 | 腾讯科技(深圳)有限公司 | 一种电竞数据处理方法、装置、设备及存储介质 |
WO2023141167A1 (en) * | 2022-01-19 | 2023-07-27 | Innopeak Technology, Inc. | Application group data transfer support based on group quality-of-service policy |
Also Published As
Publication number | Publication date |
---|---|
US20220217611A1 (en) | 2022-07-07 |
CN112566149B (zh) | 2023-04-28 |
CN112566149A (zh) | 2021-03-26 |
EP4027684A1 (en) | 2022-07-13 |
EP4027684A4 (en) | 2023-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021057794A1 (zh) | 配置业务的方法、通信装置和通信系统 | |
WO2020187052A1 (zh) | 一种网络切片选择方法及装置 | |
WO2022257549A1 (zh) | 网络切片方法、设备及存储介质 | |
WO2023280121A1 (zh) | 一种获取边缘服务的方法和装置 | |
US20220408162A1 (en) | Multicast service transmission method and apparatus | |
US20230199550A1 (en) | Relay Management Method and Communication Apparatus | |
KR20210024160A (ko) | 통신 방법 및 장치 | |
WO2021068830A1 (zh) | 用于多播传输的方法和装置 | |
US20230254922A1 (en) | Multipath transmission method and communication apparatus | |
US20240172084A1 (en) | Data transmission method and apparatus | |
WO2023024931A1 (zh) | 用于设备间通信的方法和装置 | |
US20230422016A1 (en) | Network access method and apparatus | |
WO2023011049A1 (zh) | 一种通信方法及装置 | |
US20230232196A1 (en) | Data communication method and communication apparatus | |
WO2023160199A1 (zh) | 一种接入通信网络的方法和装置 | |
US20220263879A1 (en) | Multicast session establishment method and network device | |
WO2022199451A1 (zh) | 会话切换的方法和装置 | |
US20240244497A1 (en) | Communication method and apparatus | |
WO2022170798A1 (zh) | 确定策略的方法和通信装置 | |
WO2023213177A1 (zh) | 一种通信方法及装置 | |
WO2023020481A1 (zh) | 用于传输数据的方法和装置 | |
WO2023051288A1 (zh) | 一种隧道管理方法、装置及系统 | |
WO2023103575A1 (zh) | 组播/广播通信的方法与相关装置 | |
WO2024012230A1 (zh) | 通信方法及装置 | |
WO2023185620A1 (zh) | 通信的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20867686 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2020867686 Country of ref document: EP Effective date: 20220406 |