WO2021093763A1 - Procédé et appareil de mise en cache de données - Google Patents

Procédé et appareil de mise en cache de données Download PDF

Info

Publication number
WO2021093763A1
WO2021093763A1 PCT/CN2020/128081 CN2020128081W WO2021093763A1 WO 2021093763 A1 WO2021093763 A1 WO 2021093763A1 CN 2020128081 W CN2020128081 W CN 2020128081W WO 2021093763 A1 WO2021093763 A1 WO 2021093763A1
Authority
WO
WIPO (PCT)
Prior art keywords
network element
network function
network
function network
udsf
Prior art date
Application number
PCT/CN2020/128081
Other languages
English (en)
Chinese (zh)
Inventor
杨文进
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021093763A1 publication Critical patent/WO2021093763A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context

Definitions

  • the embodiments of the present application relate to the field of communication technologies, and in particular, to a data caching method and device.
  • the fifth-generation (5th-Generation, 5G) core system architecture of the Rel.15 standard is based on a service-based architecture (SBA), and the main purpose is to split each network function (NF) network element One or more network function network element services (NF service), each network function network element service intercommunication with other network function network element services through standard interfaces.
  • SBA service-based architecture
  • NF service network function network element services
  • the 5G system architecture allows any NF to store and read unstructured data in an unstructured data storage function (UDSF), such as user equipment (UE) context.
  • UDSF unstructured data storage function
  • UE user equipment
  • Multiple NFs can share one UDSF network element, or have their own independent UDSF network elements.
  • AMF access and mobility management function
  • the embodiments of the present application provide a data caching method and device, which can alleviate the impact of the signaling storm on the UDSF network element after the elastic scaling or failure, and reduce the service delay.
  • a data caching method including: an unstructured data storage function UDSF determines that a first network function network element is faulty; the UDSF sends unstructured data corresponding to the first network function network element to a second network function network element ,
  • the second network function network element is a backup device of the first network function network element. Since the UDSF can manage the unstructured data of each network function network element, when the first network function network element fails, the UE or the network side in the prior art will request unstructured data from the UDSF, which will cause trust to the UDSF. Make an impact.
  • the UDSF when the UDSF determines that the first network function network element is faulty, it can actively push the unstructured data corresponding to the first network function network element and send it to the non-faulty second network function network element for the UE or the network side. It can request unstructured data from the second network function network element to alleviate the impact of UDSF signaling. Unstructured data can be contextual data.
  • the second network function network element may be a backup entity of the first network function network element.
  • the UDSF determining that the first network function network element is faulty includes: if the UDSF receives a notification message from the network storage function NRF, and the notification message indicates that the first network function network element is faulty, the UDSF determines the first network function The network element is faulty. Since NRF can manage the registration, update or de-registration of each NF, when the first network function network element fails, NRF can know that the first network function network element is faulty, and then NRF can detect the first network function network element failure. The event is notified to other NFs, including the second network function network element, UDSF, SMF, etc., and the UDSF can determine the failure of the first network function network element according to the event.
  • the first network function network element may also notify the RAN of a message that the first network function network element is unavailable. In this way, when RNA or other network function network elements, etc., receive a service request, the service request can be sent to the network function network element that is the backup of the first network function network element.
  • the notification message includes the correspondence between different identifiers and the identifier of the standby entity of the first network function network element; the standby entity includes the second network function network element; the non-identifier corresponding to each identifier Structured data is different.
  • UDSF sending the unstructured data corresponding to the first network function network element to the second network function network element includes: UDSF sends the unstructured data corresponding to the first network function network element to the second network function network element according to the corresponding relationship Part of the data; the part of the data includes unstructured data under the identifier corresponding to the identifier of the second network function network element.
  • the backup entity of the first network function network element is multiple second network function network elements
  • the identifier is the globally unique access and mobility management function AMF identifier GUAMI.
  • the UDSF sending the unstructured data corresponding to the first network function network element to the second network function network element includes: the UDSF sends the first network function network element to the second network function network element according to the priority of the unstructured data.
  • Unstructured data corresponding to network function network elements may be: priority of time or priority of data, etc.
  • the cache hit rate of high-priority users or high-priority services can be improved to ensure user experience.
  • a data caching method including: a first network function network element determines that a second network function network element is faulty; the first network function network element obtains the information of the second network function network element from an unstructured data storage function UDSF Unstructured data.
  • the difference from the first aspect is that the backup entity of the failed second network function network element, that is, the first network function network element can actively subscribe to the UDSF for unstructured data of the second network function network element. The effect can be seen in the first aspect.
  • the first network function network element determining that the second network function network element is faulty includes: if the first network function network element receives a notification message from the network storage function NRF, the notification message indicates the second network function network If the element is faulty, it is determined that the second network function network element is faulty. The effect of this design can be seen in the first aspect.
  • the notification message includes the correspondence between different identifiers and the identifier of the backup entity of the first network function network element; the backup entity includes the first network function network element; each identifier corresponds to The unstructured data of the first network function network element is different from the unstructured data storage function UDSF.
  • the unstructured data stored by the second network function network element includes: the first network function network element receives the second network function from the UDSF Part of the data of the unstructured data corresponding to the network element; the part of the data includes the unstructured data under the identifier corresponding to the identifier of the second network function network element.
  • the identifier is the globally unique access and mobility management function AMF identifier GUAMI.
  • the method further includes: the first network function network element receives a first request message, the first request message is used to obtain the first unstructured data; if the first network function network element determines that it is not stored locally For the first unstructured data, the first network function network element requests the UDSF to obtain the first unstructured data. That is, if the first network function network element has not obtained the first unstructured data from the UDSF in time, when the first network function network element has received the first request message, it may request the UDSF to obtain the first unstructured data.
  • a communication device including: a processing unit, configured to determine a failure of a first network function network element; a transceiver unit, configured to send an unstructured network element corresponding to the first network function network element to a second network function network element Data, the second network function network element is a backup device of the first network function network element.
  • the processing unit is configured to, if it is determined that the transceiver unit is used to receive a notification message from the network storage function NRF, and the notification message indicates that the first network function network element is faulty, determine that the first network function network element is faulty .
  • the transceiver unit is used to send part of the unstructured data corresponding to the first network function network element to the second network function network element; part of the data includes the unstructured data of the terminal device corresponding to the same identifier Data; among them, the identifier is the globally unique access and mobility management function AMF identifier GUAMI.
  • the transceiver unit is configured to send the unstructured data corresponding to the first network function network element to the second network function network element according to the priority of the unstructured data.
  • a communication device including: a processing unit, configured to determine the failure of a second network function network element; and a transceiver unit, configured to obtain the unstructured network element of the second network function network element from the unstructured data storage function UDSF data.
  • the processing unit is configured to, if the transceiver unit is configured to receive a notification message from the network storage function NRF, and the notification message indicates that the second network function network element is faulty, determine that the second network function network element is faulty.
  • the processing unit is configured to: obtain part of the unstructured data corresponding to the second network function network element from the UDSF; the part of the unstructured data includes unstructured data of the terminal device corresponding to the same identifier; where , Identified as the globally unique access and mobility management function AMF identifier GUAMI.
  • the transceiver unit is used to receive the first request message, which is used to obtain the first unstructured data; the transceiver unit is used to if the first network function network element determines that the first network element does not store the first request message locally. For unstructured data, a request is made to the UDSF to obtain the first unstructured data.
  • a computer-readable storage medium including a program or instruction.
  • the program or instruction is executed by a processor, the method described in the first aspect and any one of the possible designs of the first aspect is carried out.
  • a computer-readable storage medium including a program or instruction.
  • the program or instruction is executed by a processor, the method described in the first aspect and any one of the possible designs of the first aspect is carried out.
  • a computer program product is provided.
  • the computer program product runs on a computer, the method described in the second aspect and any one of the possible designs of the second aspect is executed.
  • An eighth aspect provides a computer program product.
  • the computer program product runs on a computer, the method described in the second aspect and any one of the possible designs of the second aspect is executed.
  • an embodiment of the present application provides a communication system, which may include a first network function network element, a second network function network element, and a UDSF in any possible implementation manner of any of the above aspects.
  • the UDSF can execute the data caching method in the first aspect and any possible design
  • the first network function network element can execute the data caching method in the second aspect and any possible design.
  • FIG. 1 is a schematic diagram of any NF caching context data to the UDSF according to an embodiment of the application
  • FIG. 2 is a schematic diagram of a network architecture provided by an embodiment of the application.
  • FIG. 3 is a schematic flowchart of a data caching method provided by an embodiment of the application.
  • FIG. 4 is a schematic diagram of signaling interaction of a data caching method provided by an embodiment of the application.
  • FIG. 5 is a schematic flowchart of a data caching method provided by an embodiment of the application.
  • 6A is a schematic flowchart of a data caching method provided by an embodiment of the application.
  • 6B is a schematic flowchart of a data caching method provided by an embodiment of the application.
  • FIG. 7 is a schematic diagram of signaling interaction of a data caching method provided by an embodiment of the application.
  • FIG. 8 is a schematic structural diagram of a network function network element provided by an embodiment of this application.
  • FIG. 9 is a schematic structural diagram of a network function network element provided by an embodiment of this application.
  • FIG. 10 is a schematic structural diagram of a network function network element provided by an embodiment of this application.
  • FIG. 11 is a schematic structural diagram of a network function network element provided by an embodiment of this application.
  • AMF It is the end point of the radio access network (Radio Access Network, RAN) signaling interface (N2), and the end point of the network attached storage (NAS) (N1) signaling. It is mainly responsible for the encryption and encryption of NAS messages. Complete security, responsible for registration, access, mobility, authentication, transparent SMS and context management and other functions. In addition, when interacting with an evolved packet system (EPS) network, it is also responsible for the distribution of the identification (ID) of the EPS bearer, etc.
  • EPS evolved packet system
  • UDSF The 5G system architecture allows any NF to store and retrieve its unstructured data in UDSF (such as UE messages).
  • the UDSF belongs to the same public land mobile network (PLMN) where the network function network element is located.
  • PLMN public land mobile network
  • NFs can share the UDSF used to store their respective unstructured data, or each NF can have its own corresponding UDSF (for example, the UDSF can be located near the corresponding NF).
  • Network storage function supports the service discovery function, that is, receives the NF-Discovery-Request (NF-Discovery-Request) sent by the network element, and then provides the discovered network element information to the requester; maintains available network element instances
  • the characteristics of the network element and the service capabilities it supports; the characteristic parameters of a network element mainly include: network element instance ID, network element type, network fragment related ID, network element IP or domain name, network element capability information, and supported services Ability name, etc. It can also be said that NRF can be responsible for the registration and management of NF.
  • Session management function The main functions include the end point of session management (SM) messages of NAS messages; the establishment, modification, and release of sessions; UE internet protocol (IP) ) Allocation management; dynamic host configuration protocol (dynamic host configuration protocol, DHCP) function; select and control user plane function (UPF) for a session; collect billing data and support billing interface; determine a session Service and session continuity (SSC) mode; downlink data indication, etc.
  • SM session management function
  • IP internet protocol
  • DHCP dynamic host configuration protocol
  • UPF select and control user plane function
  • Unified data management The main functions that are responsible include: generating the third generation partnership project (3rd generation partnership project, 3gpp) authentication certificate/authentication parameter; storing and managing the permanent user ID of the 5G system ; 3) Subscription information management; 4) Mobile-terminated-short message service (MT-SMS) delivery; 5) SMS management; 6) User’s service network element registration management (for example, the current terminal device Provide business AMF, SMF, etc.).
  • PCF Policy control function entity
  • the main functions are: support a unified policy framework to manage network behaviors; provide policy rules for network entities to implement and execute; access to unified data repository (UDR) subscription information Wait.
  • UDR unified data repository
  • RAN It can be a radio access network in a 5G system, including two functional entities: a centralized unit (CU) and a distributed unit (DU).
  • CU assumes radio resource control (Radio Resource Control, RRC)/packet data convergence protocol (PDCP) layer functions
  • DU assumes radio link control (RLC) layer/media access control (medium access control)
  • RLC radio link control
  • MAC physical layer
  • PHY physical layer
  • Auto scaling A management service that automatically adjusts the scale of cloud resources based on monitoring indicators or preset policies. Automatic scaling supports timing and alarm scaling without manual intervention, which can reduce tedious manual operations. It can also be understood that with elastic scaling, scaling rules can be set according to business needs and policies, ECS instances are automatically added to ensure computing capacity when business needs grow, and elastic computing services (ECS) are automatically reduced when business needs drop. Examples to save costs. Elastic scaling is not only suitable for applications with constantly fluctuating business volume, but also for applications with stable business volume.
  • dynamically adjust computing resources according to business needs such as automatically adding instances to the inspur server load balancer (InSLB) backend during business peaks, and reducing instances when the business is low; automatically replacing unhealthy InSLB backends Examples to ensure the normal operation of the business without manual intervention; set a regular schedule to automatically create a batch of cloud hosts before promotional activities, and cooperate with intelligent scaling to ensure the normal operation of the business.
  • InSLB inspur server load balancer
  • first and second are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Therefore, the features defined with “first” and “second” may explicitly or implicitly include one or more of these features. In the description of the present embodiment, unless otherwise specified, "plurality" means two or more.
  • This application addresses the problem that a large number of signaling accesses have a great impact on UDSF after AMF elastic scaling or failure in a 5G system, and proposes a data caching method and device, which can be applied to NF elastic scaling or failure. How to cache the unstructured data stored on the above to another unfaulted NF to ensure uninterrupted services and reduce the impact of a large number of signaling accesses on the UDSF.
  • the NF is not limited to AMF, but can also be UDM, PCF, NRF, etc.
  • the network architecture of the present application may include RAN on the access network side, SMF, NRF, AMF, and UDSF on the core network side.
  • the main functions of each network element can be referred to the above description of related concepts.
  • all network elements surrounding the AMF on the core network side in this application can be applied to this embodiment of this application.
  • AMF can be replaced with UDMA, PCF, or NRF, etc.
  • This application takes AMF as an example for description.
  • NF such as AMF
  • UDSF supports data caching locally Function
  • UDSF detects a certain NF failure
  • it can gradually push the unstructured data of the NF to the local cache of other NFs
  • subscribe to or push the NF's Unstructured data subscribe to or push the NF's Unstructured data.
  • the existing technology is triggered by a business request to obtain unstructured data from the UDSF, and this application can actively push the unstructured data of the NF to the local cache of the unfaulted NF through the UDSF, or UDSF responds to the request of the unfaulted NF and pushes unstructured data to the unfaulted NF local cache.
  • the service request of the terminal device can request the unfaulted NF, which can alleviate the impact of the signaling storm on the UDSF network element and reduce Business delay.
  • the embodiment of the present application provides a data caching method. As shown in FIG. 3, the method includes:
  • the first network function network element stores unstructured data in the UDSF.
  • the embodiment of the present application takes unstructured data as context data as an example for description.
  • the first network function network element is AMF1 as an example.
  • the AMF1 can buffer the context data of the UE, and the AMF1 also sends the locally buffered context data to the UDSF for storage. Multiple context data sent by AMF can be stored in the UDSF.
  • the UDSF determines that the first network function network element is faulty.
  • the UDSF determining that the first network function network element is faulty may include: if the UDSF receives a notification message from the NRF, and the notification message indicates that the first network function network element is faulty, the UDSF determines that the first network function network element is faulty.
  • the first network function network element is AMF1 as an example.
  • AMF1 can notify the RAN that AMF will withdraw from service, and at the same time notify the RAN that it can subsequently request service from a backup NF, such as AMF2. In this way, when the RAN receives the service request of the UE, it can send the service request to AMF2.
  • each NF provides external services through a service-oriented interface, and allows other NFs to access or call their own services.
  • the NF that provides the service can be called the "NF service provider”, and the NF that accesses or calls the service can be called the "NF service user", and these activities require the management and monitoring of the NRF. That is, when each NF is activated, it must register with the NRF to provide services. For example, if NF1 wants NF2 to provide services, first go to NRF for service discovery. In addition, when a certain NF information is changed, it will also be automatically synchronized to the NRF, and will also be deregistered with the NRF when the NF is powered off.
  • NRF can maintain information about deployed NFs, process NF discovery requests from other network elements, and can also register and manage NFs. That is, NRF needs to maintain real-time information about all network element services in the entire network.
  • NRF When AMF1 elastically scales or fails, referring to Figure 4, if NRF receives a de-registration request sent by AMF1, NRF confirms that AMF1 is faulty. When NRF confirms that AMF1 is faulty, NRF can actively send a notification message to UDSF to notify AMF1 of the fault.
  • the embodiment of the present application includes the elastic expansion and contraction within the scope of the failure.
  • the NRF can perform two-way periodic state detection with each NF.
  • the NRF can notify other related NFs of the abnormal state of the failed NF.
  • Other NFs include UDSF, SMF and RAN, etc.
  • the first network function network element is AMF1 as an example.
  • the UDSF determining that the first network function network element is faulty may include: the UDSF may periodically detect whether multiple AMFs corresponding to the UDSF are faulty.
  • the multiple AMFs corresponding to the UDSF may be multiple AMFs that cache unstructured data in the UDSF. For example, when the cycle time arrives, when the UDSF sends a detection message to AMF1, if it does not receive a response from AMF1 within a certain period of time, the UDSF determines that AMF1 is faulty.
  • the UDSF sends unstructured data corresponding to the first network function network element to the second network function network element, and the second network function network element is a backup device of the first network function network element.
  • the UDSF when the UDSF determines that the first network function network element is faulty, the UDSF may actively push the cached unstructured data of the first network function network element AMF1 to the second network function network element AMF2.
  • the NRF can maintain the information of the deployed NF
  • the information includes the information of the backup NF once the NF fails, that is, the backup relationship between the NFs, such as the first network function network element AMF1
  • the backup NF of AMF2 is AMF2.
  • the UDSF can query the NRF to find that the backup NF of AMF1 is AMF2. In this way, the UDSF can send the locally cached context data of AMF1 to AMF2.
  • the RAN when the UE initiates a service request (service request) to the RAN, or the network side initiates a service process, for example, when the service request is used to request context data, the RAN can request a service from AMF2. Or, when a session request arrives at the SMF, the SMF has learned from the NRF that AMF1 has failed. At this time, the SMF can send the session request to AMF2. If the session request is used to request the UE or the network side to request context data, AMF 2 can request The local cache reads the context data and sends it to the SMF so that the SMF can continue to process the business process based on the context data.
  • the UDSF when the UDSF detects a NF failure, it can push the unstructured data corresponding to the failed NF to the local cache of other unfaulted NFs, so that the UE or the network side
  • the sent service request can obtain unstructured data from the standby NF in order to continue business processing.
  • the method in the embodiments of this application can reduce the need for UDSF network elements. The impact of the signaling, which can increase the service delay.
  • the embodiment of the present application also provides a data caching method, as shown in FIG. 5, including:
  • the second network function network element stores unstructured data in the UDSF.
  • step 501 refer to the implementation of the first network function network element in step 301.
  • the first network function network element determines that the second network function network element is faulty.
  • the first network function network element is AMF2
  • the second network function network element is AMF1 as an example.
  • a de-registration process can be sent to the NRF to notify the NRF that AMF1 has failed.
  • the NRF can then notify other NFs of the AMF1 failure event, including the backup NF of AMF1 ( AMF2), UDSF and RAN, etc.
  • AMF2 obtains the event of AMF1 failure, AMF2 determines that AMF1 has failed. For example, if AMF2 receives a notification message from NRF, and the notification message indicates that AMF1 is faulty, it is determined that AMF1 is faulty.
  • the first network function network element obtains unstructured data of the second network function network element from the UDSF.
  • AMF2 may send a request message to UDSF.
  • the request message is used to request context data corresponding to AMF1 cached in UDSF from UDSF.
  • the SMF when the UE initiates a service request or the network side initiates a service process, when the service request or service process reaches the SMF, the SMF has learned from the NRF that AMF1 has failed. At this time, the SMF can send the service request of the UE or the service process of the network side Sent to AMF2, AMF2 can read the context data requested by the UE or the network side from the local cache and send it to SMF, so that SMF can continue to process the business process according to the context data.
  • AMF2 can request it from UDSF Context data.
  • AMF2 receives the first request message, which is used to obtain the first unstructured data; if AMF2 determines that the first unstructured data is not stored locally, AMF2 requests the UDSF to obtain the first unstructured data ⁇ Data.
  • the difference from the previous embodiment is that in this embodiment, the backup NF of the failed NF can actively subscribe to the UDSF for unstructured data of the failed NF, and the effect is the same as the previous embodiment. .
  • an embodiment of the present application also provides a data caching method, as shown in FIG. 6A, including:
  • the first network function network element stores unstructured data in the UDSF.
  • step 601A For the implementation of step 601A, refer to step 301.
  • the UDSF determines that the first network function network element is faulty.
  • step 602A For the implementation of step 602A, refer to step 302.
  • step 302 The difference from step 302 is that if the UDSF receives the notification message sent by the NRF to notify the AMF of the failure, the notification message also includes the correspondence between the different identifiers and the identifiers of the backup entities of the first network function network element.
  • the backup entity includes a second network function network element. The unstructured data corresponding to each identifier is different.
  • the identifier may be a globally unique access and mobility management function AMF identifier (globally unique AMF identifier, GUAMI).
  • the AMF when the AMF caches the context data of the UE, it can group the context data of multiple UEs according to GUAMI, that is, each AMF can store one or more GUAMIs.
  • the AMF can allocate a temporary identifier for the UE: 5G globally unique temporary identifier (5G-GUTI), and 5G-GUTI includes GUAMI. That is, the AMF can select a GUAMI and establish the corresponding relationship between the context data of the UE and the GUAMI.
  • the AMF will also send the corresponding relationship between the context data of the UE and the GUAMI to the UDSF for caching. That is, the corresponding relationship between the context data of the UE in the AMF and the GUAMI is also cached in the UDSF.
  • the UDSF sends partial data of unstructured data corresponding to the first network function network element to the second network function network element; the partial data includes unstructured data under the identifier corresponding to the identifier of the second network function network element.
  • the first network function network element is AMF1
  • the second network function network element is AMF2
  • the unstructured data is context data as an example.
  • the context data of the UE corresponding to GUAMI1 and the context data of the UE corresponding to GUAMI2 are cached in AMF1.
  • AMF1 is elastically scalable (preparing to withdraw from service), for example, AMF1 can initiate a de-registration process to NRF.
  • NRF determines that AMF is faulty, NRF can notify other NFs (such as AMF1's backup NF (AMF2), SMF, and AMF with a second notification message).
  • AMF2 AMF1's backup NF
  • SMF SMF
  • AMF AMF with a second notification message
  • the correspondence indicates that the context data corresponding to GUAMI1 cached in AMF1 needs to be migrated to the target AMF2, and the context data corresponding to GUAMI2 cached in AMF1 needs to be migrated to the target AMF3.
  • the UDSF can send the locally cached GUAMI1 and the context data corresponding to GUAMI1 to AMF2, and the locally cached GUAMI2 and the context data corresponding to GUAMI2 to AMF3.
  • AMF1 when AMF1 is about to withdraw from the service, it also needs to send the corresponding relationship between the GUAMI and the identifier of the spare AMF to the RAN.
  • the RAN can send the service request to a backup AMF of AMF1 according to the correspondence between the GUAMI and the identifier of the backup AMF.
  • the SMF receives the session message from the UE or the network side, the SMF has learned from the NRF that AMF1 has failed.
  • the SMF can send the session message to a backup AMF according to the correspondence between the GUAMI and the backup AMF identifier.
  • the AMF can read the context data requested by the UE or the network side from the local cache and send it to the SMF, so that the SMF can continue to process the business process according to the context data.
  • UDSF can push the context data of the UE according to GUAMI, which can ensure that the context data and service processing of the UE are on the same AMF node, and the AMF can directly read the context data from the local cache. Need to obtain context data from UDSF. This not only reduces the signaling impact on the UDSF, but also saves the memory resources of the spare AMF.
  • AMF2/AMF3 can also actively obtain UE context data corresponding to GUAMI on AMF1 from UDSF. For example, when AMF2 determines that AMF1 is faulty, it can subscribe to UDSF the context data of UE corresponding to GUAMI1 corresponding to AMF1; when AMF3 determines that AMF1 is faulty, it can subscribe to UDSF the context data of UE corresponding to GUAMI2 corresponding to AMF1.
  • This application also provides a data caching method. As shown in FIG. 6B, the method includes:
  • the first network function network element stores unstructured data in the UDSF.
  • step 601B For the implementation of step 601B, refer to step 301.
  • the first network function network element determines that the first network function network element is overloaded, it sends indication information to the UDSF.
  • the indication information is used to instruct the UDSF to send to the second network function network element the non-function network element corresponding to the first network function network element. Part of structured data.
  • the first network function network element determines that the first network function network element is overloaded. For example, the first network function network element determines that its own CPU is overloaded, or the first network function network element receives and receives data with a delay exceeding a preset value. Threshold etc.
  • the UDSF can store unstructured data corresponding to multiple network function network elements (including the first network function network element), or the UDSF stores unstructured data corresponding to the first network function network element
  • the network function network element can send instruction information to the UDSF storing the unstructured data of the first network function network element to instruct the UDSF to store the unstructured data corresponding to the first network function network element in the UDSF.
  • the data is sent to a second network function network element, and the second network function network element is a backup network element of the first network function network element.
  • the indication information may be used to instruct the UDSF to send part of the unstructured data that meets the trigger condition to the second network function network element.
  • the indication information includes the identification of the GUAMI and the second network function network element, which means that the first network function network element instructs the UDSF to send the locally stored unstructured data corresponding to the domain GUAMI to the second network function network element.
  • the UDSF receives instruction information from the first network function network element, and the UDSF sends partial data of unstructured data corresponding to the first network function network element to the second network function network element according to the instruction information.
  • the UDSF may send the context data of multiple UEs corresponding to the GUAMI stored in the UDSF to the second network function network element according to the indication information.
  • the RAN can send the service request to a backup network element of the first network function network element, that is, the second network function network element, according to the correspondence between the GUAMI and the backup AMF identifier.
  • the SMF receives the session message from the UE or the network side, the SMF has learned from the NRF that the first network function network element is overloaded, and has instructed the UDSF to send some unstructured data to the second network function network element.
  • the SMF can send the session message to a second network function network element according to the correspondence between the GUAMI and the identifier of the standby second network function network element, and the second network function network element can read the context requested by the UE or the network side from the local cache
  • the data is sent to the SMF so that the SMF can continue to process the business process based on the context data.
  • the UDSF when the UDSF sends the UE context data to the AMF, it can be pushed according to a certain strategy.
  • strategies usually include rules and triggers. When a trigger event occurs, data can be pushed according to the rules.
  • the trigger mainly includes events, such as NF state change, etc.
  • the embodiment of the present application may be to determine an AMF failure.
  • the rules are mainly composed of conditions and actions.
  • the condition is similar to a database record query, describing records that meet the condition.
  • the condition may be a condition for preferentially pushing context data.
  • Actions mainly include push actions.
  • the push strategy of the UDSF by defining the push strategy of the UDSF, it is possible to meet the requirements of various scenarios, for example, preferentially push the context data that meets the conditions.
  • the UDSF sends the unstructured data corresponding to the first network function network element to the second network function network element according to the priority of the unstructured data.
  • the UDSF sends partial data of the unstructured data corresponding to the first network function network element to the second network function network element according to the priority of the unstructured data.
  • the priority of unstructured data may be: priority of time or priority of data, etc.
  • the UDSF may preferentially push the context data of the UE corresponding to the service with the higher priority in time to the AMF2, that is, the context corresponding to the service with low latency is preferentially pushed. Data, and then push the context data of the UE corresponding to the lower-priority service.
  • the UDSF may preferentially push the context data of the UE corresponding to the call service to the AMF2 to ensure the call quality of the UE user.
  • the services with higher priority in time can also be ultra-reliable low-latency communications (URLLC) services, such as voice over long-term evolution (voice over long-term evolution, VoLTE) services and automatic Driving business, etc.
  • URLLC ultra-reliable low-latency communications
  • the UDSF may preferentially push the context data of the UE with the higher priority in the data to the AMF2, for example, the context data of the UE corresponding to the VIP (very important person) user, to Ensure the user experience of high-priority users.
  • pushing unstructured data according to the priority of the data through the UDSF can improve the cache hit rate of high-priority users or high-priority services and ensure user experience.
  • the network function network element includes hardware and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software-driven hardware depends on the specific application and design constraint conditions of the technical solution. Those skilled in the art can use different methods for each specific application in combination with the embodiments to implement the described functions, but such implementation should not be considered as going beyond the scope of the present application.
  • the network function network element can be divided into functional modules according to the foregoing method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware. It should be noted that the division of modules in this embodiment is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 8 shows a schematic diagram of a possible composition of the network function network element 80 involved in the above embodiment.
  • the network function network element may be the UDSF in the above embodiment.
  • the network function network element 80 may include: a processing unit 801 and a transceiver unit 802.
  • processing unit 801 may be used to support the network function network element 80 to execute the above step 302, step 603A, step 603B, etc., and/or other processes used in the technology described herein.
  • the transceiving unit 802 may be used to support the network function network element 80 to perform the above step 303, step 603A, step 603B, etc., and/or other processes used in the technology described herein. For example, receiving notifications or unstructured data, etc., and/or other processes used in the techniques described herein.
  • the network function network element 80 provided in this embodiment is used to execute the above-mentioned data caching method, so the same effect as the above-mentioned implementation method can be achieved.
  • the network function network element 80 may include a processing module, a storage module, and a communication module.
  • the processing module may be used to control and manage the actions of the network function network element 80, for example, it may be used to support the network function network element 80 to execute the steps performed by the processing unit 801 described above.
  • the storage module may be used to support the network function network element 80 to store program codes and data.
  • the communication module may be used to support communication between the network function network element 80 and other devices, such as communication with other NFs.
  • the processing module may be a processor or a controller. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and so on.
  • the storage module may be a memory.
  • the communication module may specifically be a transceiver, a radio frequency circuit, a Bluetooth chip, a Wi-Fi chip, and other devices that interact with other communication devices.
  • the network function network element 80 involved in this embodiment may be a network function network element 90 having the structure shown in FIG. 9 .
  • the embodiment of the present application also provides a communication device including one or more processors and one or more memories.
  • the one or more memories are coupled with one or more processors, and the one or more memories are used to store computer program codes.
  • the computer program codes include computer instructions.
  • the communication device executes The above related method steps implement the data caching method in the above embodiment.
  • the embodiments of the present application also provide a computer-readable storage medium that stores computer instructions in the computer-readable storage medium.
  • the UDSF executes the above-mentioned related method steps to implement the steps in the above-mentioned embodiments. Data caching method.
  • the embodiment of the present application also provides a computer program product.
  • the computer program product runs on a computer, the computer is caused to execute the above-mentioned related steps, so as to realize the data caching method executed by the UDSF in the above-mentioned embodiment.
  • the embodiments of the present application also provide a device.
  • the device may specifically be a chip, component or module.
  • the device may include a processor and a memory connected to each other.
  • the memory is used to store computer execution instructions.
  • the processor can execute the computer-executable instructions stored in the memory, so that the chip executes the data caching method executed by the UDSF in the foregoing method embodiments.
  • FIG. 10 shows a schematic diagram of a possible composition of the network function network element 100 involved in the foregoing embodiment.
  • the network function network element 100 may be the one in the foregoing embodiment.
  • the first network function network element or the second network function network element, the network function network element may be AMF, or other network function network elements, such as UDMA, PCF, or NRF.
  • the network function network element 100 may include: a processing unit 1001 and a transceiver unit 1002.
  • processing unit 1001 may be used to support the network function network element 80 to perform the above-mentioned step 502, etc., and/or be used in other processes of the technology described herein.
  • the transceiver unit 1002 may be used to support the network function network element 100 to perform the above-mentioned step 503, etc., and/or be used in other processes of the technology described herein. For example, receiving notifications or unstructured data, etc., and/or other processes used in the techniques described herein.
  • the network function network element 100 provided in this embodiment is used to execute the above-mentioned data caching method, so the same effect as the above-mentioned implementation method can be achieved.
  • the network function network element 100 may include a processing module, a storage module, and a communication module.
  • the processing module may be used to control and manage the actions of the network function network element 100, for example, it may be used to support the network function network element 100 to perform the steps performed by the processing unit 1001.
  • the storage module may be used to support the network function network element 100 to store program codes and data.
  • the communication module may be used to support communication between the network function network element 100 and other devices, for example, communication with other NFs (such as UDSF, NRF, etc.).
  • the processing module may be a processor or a controller. It can implement or execute various exemplary logical blocks, modules, and circuits described in conjunction with the disclosure of this application.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of digital signal processing (DSP) and a microprocessor, and so on.
  • the storage module may be a memory.
  • the communication module may specifically be a transceiver, a radio frequency circuit, a Bluetooth chip, a Wi-Fi chip, and other devices that interact with other electronic devices.
  • the network function network element 100 involved in this embodiment may be the AMF 110 having the structure shown in FIG. 11.
  • the embodiment of the present application also provides a communication device including one or more processors and one or more memories.
  • the one or more memories are coupled with one or more processors, and the one or more memories are used to store computer program codes.
  • the computer program codes include computer instructions.
  • the communication device executes The above related method steps implement the data caching method in the above embodiment.
  • the embodiments of the present application also provide a computer-readable storage medium that stores computer instructions, and when the computer instructions run on the AMF, the AMF is caused to execute the above-mentioned related method steps to implement the steps in the above-mentioned embodiments.
  • Data caching method when the computer instructions run on the AMF, the AMF is caused to execute the above-mentioned related method steps to implement the steps in the above-mentioned embodiments.
  • the embodiment of the present application also provides a computer program product, which when the computer program product runs on a computer, causes the computer to execute the above-mentioned related steps, so as to realize the data caching method executed by the AMF in the above-mentioned embodiment.
  • the embodiments of the present application also provide a device.
  • the device may specifically be a chip, component or module.
  • the device may include a processor and a memory connected to each other.
  • the memory is used to store computer execution instructions.
  • the processor can execute the computer-executable instructions stored in the memory, so that the chip executes the data caching method executed by the AMF or other NFs in the foregoing method embodiments.
  • the UDSF, AMF, computer storage media, computer program products, or chips provided in this embodiment are all used to execute the corresponding methods provided above. Therefore, the beneficial effects that can be achieved can refer to the corresponding methods provided above. The beneficial effects of the method are not repeated here.
  • Another embodiment of the present application provides a communication system, which may include the foregoing UDSF and the foregoing AMF, and may be used to implement the foregoing data caching method.
  • the disclosed device and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be divided. It can be combined or integrated into another device, or some features can be omitted or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate parts may or may not be physically separate.
  • the parts displayed as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be realized in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a readable storage medium.
  • the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of a software product, and the software product is stored in a storage medium. It includes several instructions to make a device (may be a single-chip microcomputer, a chip, etc.) or a processor (processor) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the foregoing storage media include: U disk, mobile hard disk, read only memory (read only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé et un appareil de mise en cache de données, lesquels se rapportent au domaine des communications, et peuvent atténuer le problème de l'impact d'un accès de signalisation massif sur une fonction de stockage de données non structurées (UDSF) lorsqu'une AMF est élastiquement mise à l'échelle ou est défaillante. La solution spécifique comprend les étapes suivantes : l'UDSF détermine qu'un premier élément de réseau de fonction de réseau est défaillant ; et l'UDSF envoie, à un second élément de réseau de fonction de réseau, des données non structurées correspondant au premier élément de réseau de fonction de réseau, le second élément de réseau de fonction de réseau étant un dispositif de sauvegarde du premier élément de réseau de fonction de réseau. Les modes de réalisation de la présente demande sont utilisés pendant le processus de transfert de données non structurées mises en cache après qu'une AMF est élastiquement mise à l'échelle.
PCT/CN2020/128081 2019-11-11 2020-11-11 Procédé et appareil de mise en cache de données WO2021093763A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911095573.6A CN112788085B (zh) 2019-11-11 2019-11-11 一种数据缓存方法和装置
CN201911095573.6 2019-11-11

Publications (1)

Publication Number Publication Date
WO2021093763A1 true WO2021093763A1 (fr) 2021-05-20

Family

ID=75749085

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/128081 WO2021093763A1 (fr) 2019-11-11 2020-11-11 Procédé et appareil de mise en cache de données

Country Status (2)

Country Link
CN (1) CN112788085B (fr)
WO (1) WO2021093763A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115087074A (zh) * 2022-07-08 2022-09-20 中国联合网络通信集团有限公司 一种接入网络、通信方法、网元、装置及存储介质
WO2023179365A1 (fr) * 2022-03-22 2023-09-28 华为技术有限公司 Procédé de communication et appareil de communication

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113422694B (zh) * 2021-06-08 2024-07-12 腾讯科技(深圳)有限公司 通信方法、装置、介质及电子设备
CN113382432B (zh) * 2021-08-13 2021-11-23 新华三技术有限公司 一种5g网络服务提供方法、装置及设备
CN116261153A (zh) * 2021-12-02 2023-06-13 中兴通讯股份有限公司 数据缓存方法、网元、电子设备和存储介质
CN116744346A (zh) * 2022-03-04 2023-09-12 维沃移动通信有限公司 网络故障的处理方法、终端、接入网设备及核心网设备
WO2024060150A1 (fr) * 2022-09-22 2024-03-28 Apple Inc. Minimisation des interruptions de service d'une défaillance de réseau central

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015778A1 (fr) * 2017-07-21 2019-01-24 Telefonaktiebolaget Lm Ericsson (Publ) Services de fonction de stockage de données non structurées (udsf)
CN109379206A (zh) * 2017-08-07 2019-02-22 华为技术有限公司 网络功能信息的管理方法及相关设备
CN109818766A (zh) * 2017-11-21 2019-05-28 中兴通讯股份有限公司 一种通信方法、网络功能实体、网络功能仓储及计算机可读存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190007992A1 (en) * 2017-07-03 2019-01-03 Electronics And Telecommunications Research Institute Network triggered service request method and user equipment (ue) triggered service request method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019015778A1 (fr) * 2017-07-21 2019-01-24 Telefonaktiebolaget Lm Ericsson (Publ) Services de fonction de stockage de données non structurées (udsf)
CN109379206A (zh) * 2017-08-07 2019-02-22 华为技术有限公司 网络功能信息的管理方法及相关设备
CN109818766A (zh) * 2017-11-21 2019-05-28 中兴通讯股份有限公司 一种通信方法、网络功能实体、网络功能仓储及计算机可读存储介质

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ERICSSON: "Need of loadBalancingTAURequired in NR", 3GPP DRAFT; R2-1807928 - NEED OF LOADBALANCINGTAUREQUIRED IN NR, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Busan, Korea; 20180521 - 20180525, 20 May 2018 (2018-05-20), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051444255 *
HUAWEI: "GUAMI update in case of AMF change", 3GPP DRAFT; R3-190893, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. Athens, Greece; 20180225 - 20180301, 16 February 2019 (2019-02-16), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051604827 *
HUAWEI: "Support of AMF Management", 3GPP DRAFT; R3-180912 AMF MANAGEMENT (DISC+410), 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG3, no. Athens, Greece; 20180226 - 20180302, 14 February 2018 (2018-02-14), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France, XP051401274 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023179365A1 (fr) * 2022-03-22 2023-09-28 华为技术有限公司 Procédé de communication et appareil de communication
CN115087074A (zh) * 2022-07-08 2022-09-20 中国联合网络通信集团有限公司 一种接入网络、通信方法、网元、装置及存储介质
CN115087074B (zh) * 2022-07-08 2023-05-30 中国联合网络通信集团有限公司 一种接入网络、通信方法、网元、装置及存储介质

Also Published As

Publication number Publication date
CN112788085B (zh) 2022-08-09
CN112788085A (zh) 2021-05-11

Similar Documents

Publication Publication Date Title
WO2021093763A1 (fr) Procédé et appareil de mise en cache de données
US11418413B2 (en) Sharable storage method and system for network data analytics
US20210385286A1 (en) Method and apparatus for improving service discovery
US20220191665A1 (en) Event notification method, apparatus and storage medium
US8607001B2 (en) Method, apparatus, proxy server, and system for selecting cache replacement policies
WO2018141269A1 (fr) Système et procédé d'enregistrement de réseau et de sélection de tranche de réseau
WO2019137207A1 (fr) Procédé de notification d'événement, et dispositif associé
WO2022068333A1 (fr) Procédé et appareil de traitement de demande d'accès, dispositif électronique et support de stockage lisible par ordinateur
JPWO2020185949A5 (fr)
WO2019033796A1 (fr) Procédé de traitement de session, et dispositif associé
US11251981B2 (en) Communication method and apparatus
KR20200017504A (ko) 통신 모드 스위칭 방법, 네트워크 측 디바이스 및 단말 디바이스
WO2011079467A1 (fr) Procédé, dispositif et système de planification de ressources de tampons distribués
WO2018090386A1 (fr) Procédé, dispositif et système de traitement d'anomalies de modules nf
WO2019096306A1 (fr) Procédé de traitement de requêtes, et entité correspondante
WO2018127003A1 (fr) Procédé et dispositif de détermination de période de radiomessagerie
EP4124094A1 (fr) Dispositif et procédé de détermination de politique, et système
WO2021170033A1 (fr) Procédé et appareil de configuration de réseau
WO2022127319A1 (fr) Procédé et appareil de rafraîchissement de données, et dispositif électronique et support d'enregistrement lisible par ordinateur
CN113133063B (zh) 一种会话释放方法、电子设备及存储介质
WO2019223638A1 (fr) Procédé et dispositif de transmission d'informations d'api
WO2011150711A1 (fr) Procédé et dispositif de commande d'accès
US20230403611A1 (en) Handover processing method and apparatus, and communication device
WO2010124527A1 (fr) Procédé, dispositif et système permettant de répartir une capacité de charge libre des noeuds de réseau fédérateur
WO2024055815A1 (fr) Procédé de gestion de psa de périphérie, dispositif électronique et support lisible par ordinateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20886693

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20886693

Country of ref document: EP

Kind code of ref document: A1