WO2021132502A1 - Ue, dispositif de commande et procédé de commande de communication - Google Patents

Ue, dispositif de commande et procédé de commande de communication Download PDF

Info

Publication number
WO2021132502A1
WO2021132502A1 PCT/JP2020/048535 JP2020048535W WO2021132502A1 WO 2021132502 A1 WO2021132502 A1 WO 2021132502A1 JP 2020048535 W JP2020048535 W JP 2020048535W WO 2021132502 A1 WO2021132502 A1 WO 2021132502A1
Authority
WO
WIPO (PCT)
Prior art keywords
nssai
information
identification information
message
network
Prior art date
Application number
PCT/JP2020/048535
Other languages
English (en)
Japanese (ja)
Inventor
雄大 河崎
Original Assignee
シャープ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by シャープ株式会社 filed Critical シャープ株式会社
Priority to JP2021567637A priority Critical patent/JPWO2021132502A1/ja
Publication of WO2021132502A1 publication Critical patent/WO2021132502A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/18Management of setup rejection or failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/06Registration at serving network Location Register, VLR or user mobility server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/14Backbone network devices

Definitions

  • 3GPP 3rd Generation Partnership Project
  • SAE System Architecture Evolution
  • LTE Long Term Evolution
  • 5G Next-generation mobile communication systems
  • 5GS 5th Generation
  • 5GS is a system that realizes 5G mobile communication systems.
  • 5G System is being specified (see Non-Patent Document 1 and Non-Patent Document 2).
  • 5GS extracts technical issues for connecting a wide variety of terminals to cellular networks and specifies solutions.
  • 5G Core Network 5G Core Network
  • 5G defines network slices, which are logical networks that provide specific network functions and specific network characteristics for specific service types and specific groups.
  • the network slice may be a logical network provided for a terminal having a low latency function, or may be a logical network provided for a sensor terminal used for IoT (Internet of Things). Good.
  • eNS Evolution of Network Slicing
  • 3GPP is considering adding a function to manage the number of UEs allowed for each slice as a consideration of Phase 2 of eNS.
  • the implementation method for satisfying the above requirements has not been clarified.
  • the present invention has been made in view of the above circumstances, and is to provide a method for realizing a function for eNS in 5GS.
  • the UE User Equipment; terminal device
  • the first information is the reason value indicating that the connection to the slice is restricted
  • the second information is the information indicating the value of the backoff timer.
  • the UE is characterized in that transmission of a registration request message that does not include NSSAI is not permitted while the backoff timer is being executed.
  • the control device of the present invention receives a registration request message that does not include NSSAI (Network Slice Selection Assistance information) from the UE (User Equipment; terminal device), and transmits, sends and receives the control message to the UE.
  • the control device includes a unit and a control unit that includes the first information and the second information in the control message when the default slice is congested, and the control device transmits the control message.
  • the UE is instructed to start the backoff timer, the first information is a reason value indicating that the connection to the slice is restricted, and the second information is a value of the backoff timer. It is information, and while the backoff timer is being executed, transmission of a registration request message that does not include the NSSAI of the UE is not permitted.
  • the step of receiving the first information and the second information from the control device and NSSAI are applied to the control device. If not provided, no NSSAI is associated with the backoff timer based on the reception of the first information and the second information, and the backoff timer is started with the value indicated by the second information.
  • the first information includes a step, the first information is a reason value indicating that the connection to the slice is restricted, the second information is information indicating a value of the backoff timer, and the UE is While the backoff timer is being executed, transmission of a registration request message that does not include NSSAI is not permitted.
  • the communication control method of the control device of the present invention is a step of receiving a registration request message not including NSSAI (Network Slice Selection Assistance information) from a UE (User Equipment; terminal device) and a case where the default slice is congested.
  • the control device has a step of including the first information and the second information in the control message and a step of transmitting the control message to the UE, and the control device transmits the control message.
  • the UE is instructed to start the backoff timer, the first information is a reason value indicating that the connection to the slice is restricted, and the second information is a value of the backoff timer. It is information, and while the backoff timer is being executed, transmission of a registration request message that does not include the NSSAI of the UE is not permitted.
  • eNS can be supported in 5GS, and the number of UEs permitted for each slice can be managed.
  • FIG. 1 is a diagram for explaining the outline of the mobile communication system 1 used in each embodiment
  • FIG. 2 is a diagram for explaining a detailed configuration of the mobile communication system 1.
  • the mobile communication system 1 is UE # A10, access network # A80, core network # A90, PDN (Packet Data Network) # A5, access network # B120, core network # B190, DN (Data Network) #. It is stated that it is composed of A6.
  • these devices / functions may be described by omitting symbols such as UE, access network #A, core network #A, PDN, access network #B, core network #B, DN, etc. ..
  • Fig. 2 shows the devices and functions of UE # A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, UDM150, N3IWF170, etc. , And interfaces that connect these devices / functions to each other are described.
  • these devices / functions are described as UE, E-UTRAN, MME, SGW, PGW-U, PGW-C, PCRF, HSS, 5GAN, AMF, UPF, SMF, PCF, UDM, N3IWF, etc. , The symbol may be omitted.
  • EPS Evolved Packet System
  • 4G system is configured to include access network #A and core network #A, but may also include UE and / or PDN.
  • 5GS 5G System
  • 5G System which is a 5G system, is configured to include a UE, an access network #B, and a core network #B, but may further include a DN.
  • the UE is a device that can connect to network services via 3GPP access (3GPP access network, also called 3GPP AN) and / or non-3GPP access (non-3GPP access network, also called non-3GPP AN). is there.
  • the UE may be a terminal device capable of wireless communication such as a mobile phone or a smartphone, and may be a terminal device capable of connecting to both EPS and 5GS.
  • the UE may be provided with a UICC (Universal Integrated Circuit Card) or an eUICC (Embedded UICC).
  • the UE may be expressed as a user device or a terminal device.
  • access network #A supports E-UTRAN (Evolved Universal Terrestrial Radio Access Network) and / or wireless LAN access network.
  • E-UTRAN Evolved Universal Terrestrial Radio Access Network
  • eNB evolved Node B
  • eNB45 may be described by omitting a symbol like eNB.
  • each eNB is connected to each other by, for example, an X2 interface.
  • one or more access points are arranged in the wireless LAN access network.
  • access network #B corresponds to 5G access network (5G AN).
  • 5GAN is composed of NG-RAN (NG Radio Access Network) and / or non-3GPP access network.
  • NG-RAN NG Radio Access Network
  • gNB NR Node B
  • gNB122 may be described by omitting symbols such as eNB.
  • the gNB is a node that provides the NR (New Radio) user plane and control plane to the UE, and is a node that connects to the 5GCN via an NG interface (including an N2 interface or an N3 interface).
  • gNB is a base station device newly designed for 5GS, and has a function different from that of the base station device (eNB) used in EPS, which is a 4G system.
  • eNB base station device
  • EPS base station device
  • each gNB is connected to each other by, for example, an Xn interface.
  • the non-3GPP access network may be an untrusted non-3GPP (untrusted non-3GPP) access network or a trusted non-3GPP (trusted non-3GPP) access network.
  • the unreliable non-3GPP access network may be a non-3GPP access network that does not perform security management in the access network, for example, a public wireless LAN.
  • the reliable non-3GPP access network may be an access network defined by 3GPP, and may include TNAP (trusted non-3GPP access point) and TNGF (trusted non-3GPP Gateway function).
  • E-UTRAN and NG-RAN may be referred to as 3GPP access.
  • wireless LAN access network and non-3GPP AN may be referred to as non-3GPP access.
  • the nodes located in the access network #B may be collectively referred to as NG-RAN nodes.
  • the devices included in the access network #A and / or the access network #B and / or the access network #A, and / or the devices included in the access network #B are the access network or the access network device. It may be called.
  • EPC Evolved Packet Core
  • EPC includes, for example, MME (Mobility Management Entity), SGW (Serving Gateway), PGW (Packet Data Network Gateway) -U, PGW-C, PCRF (Policy and Charging Rules Function), HSS (Home Subscriber Server), etc. Be placed.
  • MME Mobility Management Entity
  • SGW Serving Gateway
  • PGW Packet Data Network Gateway
  • PCRF Policy and Charging Rules Function
  • HSS Home Subscriber Server
  • core network #B corresponds to 5GCN (5G Core Network).
  • AMF Access and Mobility Management Function
  • UPF User Plane Function
  • SMF Session Management Function
  • PCF Policy Control Function
  • UDM Unified Data Management
  • 5GCN may be expressed as 5GC.
  • the core network #A and / or the device included in the core network #B, the core network #A, and / or the device included in the core network #B is the core network, or the core network device or the core network. It may be called an internal device.
  • the core network is a mobile network operator (Mobile) that connects the access network (access network #A and / or access network #B) with the PDN and / or DN. It may be an IP mobile communication network operated by Network Operator; MNO), it may be a core network for a mobile communication operator that operates and manages mobile communication system 1, or it may be an MVNO (Mobile Virtual Network Operator). ), A core network for virtual mobile communication operators such as MVNE (Mobile Virtual Network Enabler), and virtual mobile communication service providers.
  • MNO IP mobile communication network operated by Network Operator
  • MVNO Mobile Virtual Network Operator
  • a core network for virtual mobile communication operators such as MVNE (Mobile Virtual Network Enabler), and virtual mobile communication service providers.
  • the PDN may be a DN (Data Network) that provides a communication service to the UE.
  • the DN may be configured as a packet data service network or may be configured for each service.
  • the PDN may include a connected communication terminal. Therefore, connecting to the PDN may be connecting to a communication terminal or server device arranged in the PDN. Further, sending and receiving user data to and from the PDN may be sending and receiving user data to and from a communication terminal or server device arranged in the PDN.
  • PDN may be expressed as DN
  • DN may be expressed as PDN.
  • access network #A, core network #A, PDN, access network #B, core network #B, at least a part of DN, and / or one or more devices included in these are referred to as a network or network device. It may be called.
  • the fact that the network and / or the network device sends and receives messages and / or executes the procedure means that the access network #A, core network #A, PDN, access network #B, core network #B, and DN It means that at least a part and / or one or more devices included therein send and receive messages and / or perform procedures.
  • the UE can connect to the access network.
  • the UE can also connect to the core network via the access network.
  • the UE can connect to the PDN or DN via the access network and core network. That is, the UE can send / receive (communicate) user data with the PDN or DN.
  • IP Internet Protocol
  • non-IP communication may be used.
  • IP communication is data communication using IP, and data is transmitted and received by IP packets.
  • An IP packet is composed of an IP header and a payload part.
  • the payload section may include devices / functions included in EPS and data transmitted / received by devices / functions included in 5GS.
  • non-IP communication is data communication that does not use IP, and data is transmitted and received in a format different from the structure of IP packets.
  • non-IP communication may be data communication realized by sending and receiving application data to which an IP header is not added, or a UE can add another header such as a Mac header or an Ethernet (registered trademark) frame header. User data to be sent and received may be sent and received.
  • the access network #A, the core network #A, the access network #B, the core network #B, the PDN #A, and the DN #A may be configured with devices not shown in FIG.
  • the core network #A and / or the core network #B may include an AUSF (Authentication Server Function) or a AAA (Authentication, authorization, and accounting) server (AAA-S).
  • AUSF Authentication Server Function
  • AAA Authentication, authorization, and accounting server
  • AUSF is a core network device equipped with an authentication function for 3GPP access and non-3GPP access. Specifically, it is a network function unit that receives an authentication request for 3GPP access and / or non-3GPP access from the UE and executes the authentication procedure.
  • the AAA server is a device that has authentication, approval, and billing functions that connects directly to AUSF or indirectly via other network devices.
  • the AAA server may be a network device in the core network.
  • the AAA server may not be included in the core network #A and / or the core network #B, but may be included in the PLMN. That is, the AAA server may be a core network device or a device outside the core network.
  • the AAA server may be a server device in PLMN managed by the 3rd Party.
  • mobile communication system 1 includes multiple UE # A10, E-UTRAN80, MME40, SGW35, PGW-U30, PGW-C32, PCRF60, HSS50, 5G AN120, AMF140, UPF130, SMF132, PCF160, and /
  • a device / function such as UDM150 may be configured.
  • each device may be configured as physical hardware, may be configured as logical (virtual) hardware configured on general-purpose hardware, or may be configured as software. May be done. Further, at least a part (including all) of the functions of each device may be configured as physical hardware, logical hardware, or software.
  • each storage unit (storage unit # A340, storage unit # A440, storage unit # B540, storage unit # A640, storage unit # B740) in each device / function appearing below may be, for example, a semiconductor memory or SSD (storage unit # A340, storage unit # A440, storage unit # B540, storage unit # A640, storage unit # B740). It consists of Solid State Drive), HDD (Hard Disk Drive), etc.
  • each storage unit has not only the information originally set from the shipping stage, but also devices / functions other than its own device / function (for example, UE and / or access network device, and / or core network device, and /. Or PDN and / or DN) can store various information sent and received.
  • each storage unit can store identification information, control information, flags, parameters, and the like included in control messages transmitted and received in various communication procedures described later. Further, each storage unit may store such information for each UE. In addition, each storage unit can store control messages and user data sent and received between 5GS and / or devices / functions included in EPS when interwork is performed between 5GS and EPS. it can. At this time, not only those transmitted / received via the N26 interface but also those transmitted / received without the N26 interface can be stored.
  • the UE is composed of a control unit # A300, an antenna 310, a transmission / reception unit # A320, and a storage unit # A340.
  • the control unit # A300, the transmission / reception unit # A320, and the storage unit # A340 are connected via a bus.
  • the transmitter / receiver # A320 is connected to the antenna 310.
  • Control unit # A300 is a functional unit that controls the operation and functions of the entire UE.
  • the control unit # A300 realizes various processes in the UE by reading and executing various programs stored in the storage unit # A340 as needed.
  • Transmission / reception unit # A320 is a functional unit for wireless communication with a base station device (eNB or gNB) in the access network via an antenna. That is, the UE can send and receive user data and / or control information between the access network device and / or the core network device and / or PDN and / or DN using the transmitter / receiver # A320. it can.
  • eNB base station device
  • gNB gNode B
  • the UE can send and receive user data and / or control information between the access network device and / or the core network device and / or PDN and / or DN using the transmitter / receiver # A320. it can.
  • the UE can communicate with the base station device (eNB) in the E-UTRAN via the LTE-Uu interface by using the transmitter / receiver # A320.
  • the UE can communicate with the base station device (gNB) in the 5GAN by using the transmission / reception unit # A320.
  • the UE can send and receive NAS (Non-Access-Stratum) messages to and from the AMF via the N1 interface by using the transmitter / receiver # A320.
  • NAS Non-Access-Stratum
  • Storage unit # A340 is a functional unit for storing programs, user data, control information, etc. required for each operation of the UE.
  • the gNB is composed of a control unit # B500, an antenna 510, a network connection unit # B520, a transmission / reception unit # B530, and a storage unit # B540.
  • the control unit # B500, the network connection unit # B520, the transmission / reception unit # B530, and the storage unit # B540 are connected via a bus.
  • the transmitter / receiver # B530 is connected to the antenna 510.
  • Control unit # B500 is a functional unit that controls the operation and function of the entire gNB.
  • the control unit # B500 realizes various processes in the gNB by reading and executing various programs stored in the storage unit # B540 as needed.
  • Network connection # B520 is a functional unit for gNB to communicate with AMF and / or UPF. That is, the gNB can send and receive user data and / or control information to and from the AMF and / or UPF using the network connection unit # B520.
  • Transmission / reception unit # B530 is a functional unit for wireless communication with the UE via the antenna 510. That is, the gNB can transmit / receive user data and / or control information to / from the UE by using the transmission / reception unit # B530.
  • the gNB in the 5GAN can communicate with the AMF via the N2 interface by using the network connection # B520, and the UPF via the N3 interface. Can communicate with.
  • gNB can communicate with the UE by using the transmission / reception unit # B530.
  • Storage unit # B540 is a functional unit for storing programs, user data, control information, etc. required for each operation of gNB.
  • the AMF consists of a control unit # B700, a network connection unit # B720, and a storage unit # B740.
  • the control unit # B700, the network connection unit # B720, and the storage unit # B740 are connected via a bus.
  • the AMF may be a node that handles the control plane.
  • Control unit # B700 is a functional unit that controls the operation and functions of the entire AMF.
  • the control unit # B700 realizes various processes in the AMF by reading and executing various programs stored in the storage unit # B740 as needed.
  • Network connection # B720 is a functional unit for AMF to connect to the base station equipment (gNB) and / or SMF and / or PCF, and / or UDM, and / or SCEF in 5GAN. That is, the AMF uses the network connection # B720 to communicate with the base station equipment (gNB) in 5GAN and / or SMF, and / or PCF, and / or UDM, and / or SCEF. Data and / or control information can be sent and received.
  • the AMF in the 5GCN can communicate with the gNB via the N2 interface by using the network connection # A620, and with the UDM via the N8 interface. It can communicate, it can communicate with the SMF via the N11 interface, and it can communicate with the PCF via the N15 interface.
  • AMF can send and receive NAS messages to and from the UE via the N1 interface by using the network connection unit # A620.
  • the N1 interface is logical, communication between the UE and AMF is actually done via 5GAN. If the AMF supports the N26 interface, it can communicate with the MME via the N26 interface by using the network connection # A620.
  • Storage unit # B740 is a functional unit for storing programs, user data, control information, etc. required for each operation of AMF.
  • AMF has a function to exchange control messages with RAN using N2 interface, a function to exchange NAS messages with UE using N1 interface, a function to encrypt and protect the integrity of NAS messages, and registration management.
  • the RM status for each UE is managed.
  • the RM state may be synchronized between the UE and AMF.
  • the RM state includes a non-registered state (RM-DEREGISTERED state) and a registered state (RM-REGISTERED state).
  • RM-DEREGISTERED state the UE is not registered in the network, and the UE context in the AMF does not have valid location information or routing information for the UE, so the AMF cannot reach the UE.
  • the RM-REGISTERED state the UE is registered in the network, so the UE can receive services that require registration with the network.
  • the RM state may be expressed as a 5GMM state.
  • the RM-DEREGISTERED state may be expressed as the 5GMM-DEREGISTERED state
  • the RM-REGISTERED state may be expressed as the 5GMM-REGISTERED state.
  • 5GMM-REGISTERED may be in a state where each device has established a 5GMM context or a PDU session context.
  • UE # A10 may start sending and receiving user data and control messages, or may respond to paging. Further, when each device is 5GMM-REGISTERED, UE # A10 may execute a registration procedure other than the registration procedure for initial registration and / or a service request procedure.
  • each device may be in a state where the 5GMM context has not been established, the location information of UE # A10 may not be known to the network, or the network is in a UE. It may be in a state where # A10 cannot be reached. If each device is 5GMM-DEREGISTERED, UE # A10 may start the registration procedure or establish the 5GMM context by executing the registration procedure.
  • the CM state may be synchronized between the UE and AMF.
  • the CM state includes a non-connected state (CM-IDLE state) and a connected state (CM-CONNECTED state).
  • CM-IDLE state the UE is in the RM-REGISTERED state, but does not have a NAS signaling connection established with the AMF via the N1 interface.
  • N2 connection N2 connection
  • N3 connection N3 interface connection
  • the CM-CONNECTED state it has a NAS signaling connection established with AMF via the N1 interface.
  • the CM-CONNECTED state it has a NAS signaling connection established with AMF via the N1 interface.
  • the CM-CONNECTED state the UE may have an N2 interface connection (N2 connection) and / or an N3 interface connection (N3 connection).
  • the CM state in 3GPP access and the CM state in non-3GPP access may be managed separately.
  • the CM state in 3GPP access may be a non-connected state in 3GPP access (CM-IDLE state over 3GPP access) and a connected state in 3GPP access (CM-CONNECTED state over 3GPP access).
  • the CM state in non-3GPP access includes the non-connected state (CM-IDLE state over non-3GPP access) in non-3GPP access and the connection state (CM-CONNECTED state over non-3GPP access) in non-3GPP access. ) May be there.
  • the disconnected state may be expressed as an idle mode
  • the connected state mode may be expressed as a connected mode.
  • the CM state may be expressed as 5GMM mode (5GMM mode).
  • the non-connected state may be expressed as 5GMM non-connected mode (5GMM-IDLE mode)
  • the connected state may be expressed as 5GMM connected mode (5GMM-CONNECTED mode).
  • the disconnected state in 3GPP access may be expressed as 5GMM non-connection mode (5GMM-IDLE mode over 3GPP access) in 3GPP access
  • the connection state in 3GPP access is 5GMM connection mode (5GMM-) in 3GPP access. It may be expressed as CONNECTED mode over 3GPP access).
  • non-connection state in non-3GPP access may be expressed as 5GMM non-connection mode (5GMM-IDLE mode over non-3GPP access) in non-3GPP access, and the connection state in non-3GPP access is non. It may be expressed as 5GMM connection mode (5GMM-CONNECTED mode over non-3GPP access) in -3GPP access.
  • the 5GMM non-connection mode may be expressed as an idle mode, and the 5GMM connection mode may be expressed as a connected mode.
  • AMF may be placed in the core network #B.
  • AMF may be an NF that manages one or more NSIs (Network Slice Instances).
  • the AMF may be a shared CP function (CCNF; Common CPNF (Control Plane Network Function)) shared among a plurality of NSIs.
  • CCNF Common CPNF (Control Plane Network Function)
  • N3IWF is a device and / or function that is placed between non-3GPP access and 5GCN when the UE connects to 5GS via non-3GPP access.
  • the SMF consists of a control unit # B700, a network connection unit # B720, and a storage unit # B740.
  • the control unit # B700, the network connection unit # B720, and the storage unit # B740 are connected via a bus.
  • the SMF may be a node that handles the control plane.
  • Control unit # B700 is a functional unit that controls the operation and functions of the entire SMF.
  • the control unit # B700 realizes various processes in the SMF by reading and executing various programs stored in the storage unit # B740 as needed.
  • the network connection unit # B720 is a functional unit for SMF to connect with AMF and / or UPF, and / or PCF, and / or UDM. That is, the SMF can send and receive user data and / or control information between the AMF and / or the UPF, and / or the PCF, and / or the UDM by using the network connection unit # B720.
  • the SMF in the 5GCN can communicate with the AMF via the N11 interface by using the network connection # A620, and with the UPF via the N4 interface. It can communicate, it can communicate with the PCF via the N7 interface, and it can communicate with the UDM via the N10 interface.
  • Storage unit # B740 is a functional unit for storing programs, user data, control information, etc. required for each operation of SMF.
  • SMF has session management functions such as establishment, modification, and release of PDU sessions, IP address allocation and management functions for UEs, UPF selection and control functions, and appropriate destinations (destination). ), UPF setting function for routing traffic to), function to send and receive SM part of NAS message, function to notify that downlink data has arrived (Downlink Data Notification), AN via N2 interface via AMF It has a function to provide SM information peculiar to AN (for each AN) transmitted to, a function to determine the SSC mode (Session and Service Continuity mode) for the session, a roaming function, and the like.
  • SSC mode Session and Service Continuity mode
  • the UPF consists of a control unit # B700, a network connection unit # B720, and a storage unit # B740.
  • the control unit # B700, the network connection unit # B720, and the storage unit # B740 are connected via a bus.
  • the UPF may be a node that handles the control plane.
  • Control unit # B700 is a functional unit that controls the operation and functions of the entire UPF.
  • the control unit # B700 realizes various processes in the UPF by reading and executing various programs stored in the storage unit # B740 as needed.
  • Network connection # B720 is a functional unit for UPF to connect to the base station equipment (gNB) and / or SMF and / or DN in 5GAN. That is, the UPF uses the network connection # B720 to send and receive user data and / or control information between the base station equipment (gNB) in 5GAN and / or SMF and / or DN. Can be done.
  • the UPF in the 5GCN can communicate with the gNB via the N3 interface by using the network connection # A620, and with the SMF via the N4 interface. It can communicate, it can communicate with the DN via the N6 interface, and it can communicate with other UPFs via the N9 interface.
  • Storage unit # B740 is a functional unit for storing programs, user data, control information, etc. required for each operation of UPF.
  • the UPF acts as an anchor point for intra-RAT mobility or inter-RAT mobility, as an external PDU session point for interconnecting the DN (ie, as a gateway between the DN and core network #B, as a user.
  • Data transfer function
  • packet routing and transfer function
  • UL CL Uplink Classifier
  • It has a branching point function, a QoS (Quality of Service) processing function for userplane, a function for verifying uplink traffic, a function for buffering downlink packets, and a function for triggering downlink data notification (Downlink Data Notification).
  • QoS Quality of Service
  • the UPF may also be a gateway for IP communication and / or non-IP communication.
  • the UPF may have a function of transferring IP communication, or may have a function of converting between non-IP communication and IP communication.
  • the plurality of gateways to be arranged may be a gateway connecting the core network #B and a single DN.
  • the UPF may have connectivity with other NFs, or may be connected to each device via the other NFs.
  • the user plane is user data transmitted and received between the UE and the network.
  • the user plane may be transmitted and received using a PDN connection or a PDU session.
  • the user plane may be transmitted and received using the LTE-Uu interface and / or the S1-U interface and / or the S5 interface and / or the S8 interface and / or the SGi interface.
  • the user plane may be transmitted and received via the interface between the UE and NG RAN and / or the N3 interface and / or the N9 interface and / or the N6 interface.
  • the user plane may be expressed as a U-Plane.
  • control plane is a control message sent and received to control the communication of the UE.
  • the control plane may be transmitted and received using a NAS (Non-Access-Stratum) signaling connection between the UE and MME.
  • NAS Non-Access-Stratum
  • the control plane may be transmitted and received using the LTE-Uu interface and the S1-MME interface.
  • the control plane may be transmitted and received using the interface between the UE and NG RAN and the N2 interface.
  • the control plane may be expressed as a control plane or a C-Plane.
  • the U-Plane (User Plane; UP) may be a communication path for transmitting and receiving user data, and may be composed of a plurality of bearers.
  • the C-Plane (Control Plane; CP) may be a communication path for transmitting and receiving control messages, and may be composed of a plurality of bearers.
  • the network refers to at least a part of the access network #B, core network #B, and DN. Further, one or more devices included in at least a part of the access network #B, the core network #B, and the DN may be referred to as a network or a network device. That is, the fact that the network executes the transmission / reception and / or processing of messages may mean that the devices (network devices and / or control devices) in the network execute the transmission / reception and / or processing of messages. .. Conversely, the fact that a device in the network executes message transmission / reception and / or processing may mean that the network executes message transmission / reception and / or processing.
  • SM session management
  • NAS Non-Access-Stratum
  • PDU session modification PDU session modification
  • the procedure for SM or SM procedure includes PDU session establishment procedure (PDU session establishment procedure), PDU session modification procedure (PDU session modification procedure), and PDU session release procedure (UE-requested PDU session release procedure). It may be.
  • Each procedure may be a procedure started from the UE or a procedure started from the NW.
  • the MM (Mobility management) message (also referred to as NAS MM message) may be a NAS message used in the procedure for MM, and is a control message sent and received between UE # A10 and AMF # A240. It's okay.
  • the MM message includes a registration request message, a registration accept message, a registration reject message, a de-registration request message, and a de-registration accept message. ) Message, configuration update command message, configuration update complete message, service request message, service accept message, service reject message, notification ) Messages, Notification response messages, etc. may be included.
  • the procedure for MM or MM procedure is registration procedure (Registration procedure), deregistration procedure (De-registration procedure), generic UE configuration update procedure, authentication / approval procedure, service request procedure ( Service request procedure), paging procedure (Paging procedure), notification procedure (Notification procedure) may be included.
  • the 5GS (5G System) service may be a connection service provided using the core network # B190. Further, the 5GS service may be a service different from the EPS service or a service similar to the EPS service.
  • non 5GS service may be a service other than the 5GS service, and may include an EPS service and / or a non EPS service.
  • the PDN (Packet Data Network) type indicates the type of PDN connection, and includes IPv4, IPv6, IPv4v6, and non-IP.
  • IPv4 When IPv4 is specified, it indicates that data is sent and received using IPv4.
  • IPv6 When IPv6 is specified, it indicates that data is sent and received using IPv6.
  • IPv4v6 When IPv6 is specified, it indicates that data is sent and received using IPv4 or IPv6.
  • non-IP it indicates that communication is performed by a communication method other than IP, not communication using IP.
  • a PDU (Protocol Data Unit / Packet Data Unit) session can be defined as the relationship between the DN that provides the PDU connectivity service and the UE, but it is established between the UE and the external gateway. It may be connectivity.
  • the UE can send and receive user data to and from the DN using the PDU session.
  • the external gateway may be UPF, SCEF, or the like.
  • the UE can use the PDU session to send and receive user data to and from devices such as application servers located in the DN.
  • each device may manage one or more identification information in association with each other for the PDU session.
  • these identification information may include one or more of DNN, QoS rule, PDU session type, application identification information, NSI identification information, access network identification information, and SSC mode, and other information. It may be further included. Further, when a plurality of PDU sessions are established, the identification information associated with the PDU session may have the same content or different contents.
  • DNN Data Network Name
  • DNN may be identification information that identifies the core network and / or the external network such as DN.
  • DNN can also be used as information for selecting a gateway such as PGW # A30 / UPF # A235 that connects the core network B190.
  • the DNN may correspond to an APN (Access Point Name).
  • the PDU (Protocol Data Unit / Packet Data Unit) session type indicates the type of PDU session, and includes IPv4, IPv6, Ethernet, and Unstructured.
  • IPv4 When IPv4 is specified, it indicates that data is sent and received using IPv4.
  • IPv6 When IPv6 is specified, it indicates that data is sent and received using IPv6.
  • Ethernet When Ethernet is specified, it indicates that Ethernet frames are sent and received. Further, Ethernet may indicate that communication using IP is not performed.
  • Unstructured it indicates that data is sent and received to the application server etc. in the DN by using the point-to-point (P2P) tunneling technology.
  • P2P point-to-point
  • the PDU session type may include an IP in addition to the above. IP can be specified if the UE can use both IPv4 and IPv6.
  • PLMN Public land mobile network
  • PLMN is a communication network that provides mobile wireless communication services.
  • PLMN is a network managed by an operator who is a telecommunications carrier, and the operator can be identified by the PLMN ID.
  • the PLMN that matches the MCC (Mobile Country Code) and MNC (Mobile Network Code) of the IMSI (International Mobile Subscriber Identity) of the UE may be Home PLMN (HPLMN).
  • the UE may have an Equivalent HPLMN list for identifying one or more EPLMNs (Equivalent HPLMNs) in the USIM.
  • the PLMN different from HPLMN and / or EPLMN may be VPLMN (Visited PLMN).
  • the PLMN that the UE has successfully registered may be an RPLMN (Registered PLMN).
  • a network slice is a logical network that provides specific network capabilities and network characteristics.
  • UEs and / or networks can support network slices (NW slices; NS) in 5GS.
  • Network slices are sometimes referred to simply as slices.
  • a network slice instance is composed of an instance (entity) of a network function (NF) and a set of necessary resources, and forms a network slice to be arranged.
  • NF is a processing function in a network and is adopted or defined in 3GPP.
  • NSI is an entity of NS composed of one or more in core network #B.
  • NSI may be composed of a virtual NF (Network Function) generated by using NST (Network Slice Template).
  • NST Network Slice Template
  • NST Network Slice Template
  • NST Network Slice Template
  • NSI may be a logical network configured to separate user data delivered by services and the like.
  • One or more NFs may be configured in NS.
  • the NF configured in NS may or may not be a device shared with other NS.
  • UE and / or devices in the network are 1 or more based on NSSAI and / or S-NSSAI and / or UE usage type and / or registration information such as 1 or more NSI IDs and / or APN. Can be assigned to NS.
  • the UE usage type is a parameter value included in the UE registration information used to identify the NSI.
  • the UE usage type may be stored in the HSS.
  • AMF may select SMF and UPF based on UE usage type.
  • S-NSSAI Single Network Slice Selection Assistance Information
  • S-NSSAI may be composed of only SST (Slice / Service type), or may be composed of both SST and SD (Slice Differentiator).
  • SST is information indicating the operation of NS expected in terms of functions and services.
  • SD may be information for interpolating SST when selecting one NSI from a plurality of NSIs represented by SST.
  • the S-NSSAI may be information peculiar to each PLMN, or may be standard information shared among PLMNs.
  • the network may store one or more S-NSSAI in the UE registration information as the default S-NSSAI. If the S-NSSAI is the default S-NSSAI and the UE does not send a valid S-NSSAI to the network in the registration request message, the network may provide the NS related to the UE.
  • NSSAI Network Slice Selection Assistance Information
  • S-NSSAI Network Slice Selection Assistance Information
  • the UE may memorize the NSSAI permitted from the network for each PLMN. Also, NSSAI may be the information used to select AMF.
  • configured NSSAI (configured NSSAI) is NSSAI supplied and stored in the UE.
  • the UE may store the configured NSSAI for each PLMN.
  • configured NSSAI may be information set by the network (or PLMN).
  • S-NSSAI included in configured NSSAI may be expressed as configured S-NSSAI.
  • configured S-NSSAI may be configured to include S-NSSAI and mapped S-NSSAI.
  • requested NSSAI is NSSAI provided from the UE to the network during the registration procedure.
  • the requested NSSAI may be an allowed NSSAI or a configured NSSAI stored in the UE.
  • requested NSSAI may be information indicating a network slice that the UE wants to access.
  • the S-NSSAI included in the requested NSSAI may be expressed as the requested S-NSSAI.
  • requested NSSAI is included in an RRC (Radio Resource Control) message that includes a NAS message or NAS (Non-Access-Stratum) message sent from the UE to the network, such as a registration request message or PDU session establishment request message. Will be done.
  • RRC Radio Resource Control
  • NAS Non-Access-Stratum
  • allowed NSSAI is information indicating one or more network slices allowed by the UE.
  • allowed NSSAI is information that identifies the network slice that the network has allowed to connect to the UE.
  • the UE and the network store and manage allowed NSSAI for each access (3GPP access or non-3GPP access) as UE information, respectively.
  • S-NSSAI included in allowed NSSAI may be expressed as allowed S-NSSAI.
  • the allowed S-NSSAI may be configured to include the S-NSSAI and the mapped S-NSSAI.
  • Mapped S-NSSAI is an HPLMN S-NSSAI mapped to the registered PLMN S-NSSAI in a roaming scenario.
  • the UE may store one or more mapped S-NSSAIs mapped to the configured NSSAIs and the S-NSSAIs included in the Allowed NSSAIs of each access type. Further, the UE may store one or more mapped S-NSSAI of the first NSSAI and / or the S-NSSAI included in the rejected NSSAI.
  • rejected NSSAI is information indicating one or more network slices for which the UE is not allowed.
  • rejected NSSAI is information that identifies network slices that the network does not allow the UE to connect to.
  • the rejected NSSAI may be information that includes one or more combinations of the S-NSSAI and the reason for rejection value.
  • the reason for refusal value is information indicating the reason why the network rejects the corresponding S-NSSAI.
  • the UE and the network may appropriately store and manage the rejected NSSAI based on the rejection reason value associated with each S-NSSAI.
  • the rejected NSSAI may be included in the NAS message transmitted from the network to the UE, such as the registration acceptance message, the setting update command, the registration refusal message, or the RRC message including the NAS message.
  • S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected NSSAI may be any of the first to third rejected NSSAI, the pending NSSAI, and the first NSSAI, or may be a combination thereof.
  • S-NSSAI included in rejected NSSAI may be expressed as rejected S-NSSAI.
  • the rejected S-NSSAI may be configured to include the S-NSSAI and the mapped S-NSSAI.
  • the first rejected NSSAI is a set of one or more S-NSSAIs that are not available in the current PLMN among the S-NSSAIs included in the requested NSSAIs by the UE.
  • the first rejected NSSAI may be a 5GS Rejected NSSAI for the current PLMN, a Rejected S-NSSAI for the current PLMN, or an S-NSSAI included in the Rejected NSSAI for the current PLMN. There may be.
  • the first rejected NSSAI may be a rejected NSSAI stored in the UE or NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the first rejected NSSAI When the first rejected NSSAI is a rejected NSSAI transmitted from the NW to the UE, the first rejected NSSAI may be information that includes one or more combinations of the S-NSSAI and the reason value.
  • the reason for refusal value at this time may be "S-NSSAI (S-NSSAI is not available in the current PLMN) which is not possible in the current PLMN", and the S-NSSAI associated with the reason for refusal value is It may be information indicating that it is not possible in the current PLMN.
  • the first rejected NSSAI is valid for the entire registered PLMN.
  • the UE and / or NW may treat the S-NSSAI contained in the first rejected NSSAI and the first rejected NSSAI as information that does not depend on the access type. That is, the first rejected NSSAI may be valid information for 3GPP access and non-3GPP access.
  • the UE may delete the first rejected NSSAI from the memory when it transitions to the unregistered state with both 3GPP access and non-3GPP access to the current PLMN.
  • the UE transitions to the unregistered state for the current PLMN via an access, or successfully registers with a new PLMN via an access, or registers with a new PLMN via an access. If the UE fails and transitions to the unregistered state, and the UE is not registered via the other access (unregistered state), the UE deletes the first rejected NSSAI.
  • the second rejected NSSAI is a set of one or more S-NSSAIs that are not available in the current registration area among the S-NSSAIs that the UE has included in the requested NSSAIs.
  • the second rejected NSSAI may be a 5GS Rejected NSSAI for the current registration area.
  • the second rejected NSSAI may be a rejected NSSAI stored in the UE or NW, or may be a rejected NSSAI transmitted from the NW to the UE.
  • the second rejected NSSAI may be information that includes one or more combinations of the S-NSSAI and the reason value.
  • the reason value at this time may be "S-NSSAI (S-NSSAI is not available in the current registration area), which is not possible in the current registration area", and the S-NSSAI associated with the reason value is It may be information indicating that it is not possible in the current registration area.
  • the second rejected NSSAI is valid within the current registration area. That is, the UE and / or NW may treat the S-NSSAI included in the second rejected NSSAI and the second rejected NSSAI as information for each access type. That is, the second rejected NSSAI may be valid information for each of 3GPP access and non-3GPP access. That is, the UE may delete the second rejected NSSAI from the memory once it has transitioned to the unregistered state for a certain access.
  • the third rejected NSSAI is an S-NSSAI that requires Network Slice-Specific Authentication and Authorization, and one or more S-NSSAI that have failed or canceled Network Slice-Specific Authentication and Authorization for that S-NSSAI. It is a set.
  • the third rejected NSSAI may be an NSSAI stored in the UE and / or the NW, or may be transmitted from the NW to the UE.
  • the third rejected NSSAI may be information that includes one or more combinations of the S-NSSAI and the reason for refusal value.
  • the reason for refusal value at this time is "S-NSSAI (S-NSSAI is not available due to the failed or revoked network slice-specific authorization and authorization), which is impossible due to the failure or cancellation of Network slice-specific authentication and authorization. It may be information indicating that the Network slice-specific authentication and authorization for S-NSSAI associated with the reason for refusal value has failed or has been cancelled.
  • the third rejected NSSAI is valid for the entire registered PLMN.
  • the UE and / or NW may treat the S-NSSAI contained in the third rejected NSSAI and the third rejected NSSAI as information that does not depend on the access type. That is, the third rejected NSSAI may be valid information for 3GPP access and non-3GPP access.
  • the third rejected NSSAI may be an NSSAI different from the rejected NSSAI.
  • the third rejected NSSAI may be the first rejected NSSAI.
  • the third rejected NSSAI is a rejected NSSAI in which the UE identifies slices rejected due to the failure or cancellation of Network Slice-Specific Authentication and Authorization from the core network. Specifically, the UE does not start the registration request procedure for the S-NSSAI included in the third rejected NSSAI while storing the third rejected NSSAI.
  • the third rejected NSSAI may be identification information including one or more S-NSSAI received from the core network in association with the rejection reason value indicating the failure of Network Slice-Specific Authentication and Authorization.
  • the third rejected NSSAI is information that does not depend on the access type.
  • the UE attempts to send a registration request message containing the S-NSSAI contained in the third rejected NSSAI to both 3GPP and non-3GPP access. It does not have to be.
  • the UE can send a registration request message including S-NSSAI included in the third rejected NSSAI based on the UE policy.
  • the UE may delete the third rejected NSSAI based on the UE policy and transition to a state in which a registration request message including the S-NSSAI included in the third rejected NSSAI can be transmitted.
  • the UE may delete the S-NSSAI from the third rejected NSSAI. Good.
  • the first NSSAI is information including one or more S-NSSAIs that have reached the maximum number of UEs for each network slice.
  • the first NSSAI may be rejected NSSAI, Allowed NSSAI, or Pending NSSAI.
  • the first NSSAI may be an NSSAI stored in the UE and / or the NW, or may be an NSSAI transmitted from the NW to the UE.
  • the first NSSAI When the first NSSAI is sent from the NW to the UE, the first NSSAI is the S-NSSAI and the mapped S-NSSAI, the reason value, the backoff timer value, and the valid period range of the backoff timer value.
  • the information may include one or a plurality of information indicating the above and at least one of the information.
  • the reason value at this time may be "S-NSSAI that has reached the maximum number of UEs for each network slice", and indicates that the maximum number of UEs that can be allowed for S-NSSAI associated with the reason for rejection value has been reached. It may be information.
  • the reason value may be the rejection reason value included in Rejected NSSAI, or may be flag information.
  • the value of the backoff timer is the period during which the UE is prohibited from transmitting the MM message and the SM message using the corresponding S-NSSAI or S-NSSAI related to the mapped S-NSSAI. It may be information indicating.
  • the information indicating the valid period range of the value of the backoff timer is whether the value of the backoff timer is applied to the current PLMN (Public Land Mobile Network), all PLMNs, or the current registration. It may be information indicating whether the area is valid.
  • PLMN Public Land Mobile Network
  • the first NSSAI may be valid for the entire registered PLMN, may be valid for all PLMNs, or may be valid within the registered area. If the first NSSAI is valid for the entire registered PLMN or for all PLMNs, the UE and / or NW will use the S-NSSAI contained in the first NSSAI and the first NSSAI as information that does not depend on the access type. You may handle it. If the first NSSAI is valid within the registration area, the UE and / or NW may treat the first NSSAI and the S-NSSAI contained in the first NSSAI as information for each access type.
  • the first NSSAI may be allowed NSSAI, rejected NSSAI, pending NSSAI, or information different from these.
  • Pending NSSAI is an S-NSSAI whose network requires network slice specific authentication, network slice specific authentication has not been completed, and one or more S-NSSAI cannot be used in the current PLMN. Is a set of.
  • the pending NSSAI may be 5GS Rejected NSSAI due to network slice specific authentication and authorization or pending NSSAI.
  • the pending NSSAI may be an NSSAI stored in the UE or NW, or may be an NSSAI transmitted from the NW to the UE.
  • the pending NSSAI is not limited to the rejected NSSAI, and may be an NSSAI independent of the rejected NSSAI.
  • the pending NSSAI When the pending NSSAI is an NSSAI transmitted from the NW to the UE, the pending NSSAI may be information that includes one or more combinations of the S-NSSAI and the reason for refusal value.
  • the reason for refusal value at this time may be "S-NSSAI (Network slice-specific authentication and authorization is pending for the S-NSSAI) pending for Network slice-specific authentication and authorization". It may be information indicating that the associated S-NSSAI is prohibited or pending from being used by the UE until it completes Network slice-specific authentication and authorization for that S-NSSAI.
  • Pending NSSAI is valid for the entire registered PLMN.
  • the UE and / or NW may treat the S-NSSAI contained in the third rejected NSSAI and pending NSSAI as information that does not depend on the access type. That is, pending NSSAI may be valid information for 3GPP access and non-3GPP access.
  • the pending NSSAI may be an NSSAI different from the rejected NSSAI.
  • the pending NSSAI may be the first rejected NSSAI.
  • Pending NSSAI is an NSSAI composed of one or more S-NSSAIs in which the UE identifies the slice that is pending the procedure. Specifically, the UE does not start the registration request procedure for the S-NSSAI included in the pending NSSAI while storing the pending NSSAI. In other words, the UE does not use the S-NSSAI included in the pending NSSAI during the registration procedure until the Network Slice-Specific Authentication and Authorization for the S-NSSAI included in the pending NSSAI is completed.
  • pending NSSAI is identification information including one or more S-NSSAI received from the core network in association with a rejection reason value indicating pending for Network Slice-Specific Authentication and Authorization.
  • pending NSSAI is information that does not depend on the access type. Specifically, when the UE remembers the pending NSSAI, the UE does not attempt to send a registration request message containing the S-NSSAI included in the pending NSSAI to both 3GPP access and non-3GPP access.
  • the tracking area is a single or multiple range managed by the core network that can be represented by the location information of UE # A10.
  • the tracking area may be composed of a plurality of cells. Further, the tracking area may be a range in which a control message such as paging is broadcast, or a range in which UE # A10 can move without performing a handover procedure. Further, the tracking area may be a routing area, a location area, or the same as these.
  • the tracking area may be TA (Tracking Area).
  • the tracking area may be identified by a TAI (Tracking Area Identity) composed of TAC (Tracking area code) and PLMN.
  • the registration area (Registration area or registration area) is a set of one or more TAs assigned to the UE by AMF.
  • UE # A10 may be able to move without transmitting and receiving a signal for updating the tracking area while moving within one or a plurality of TAs included in the registration area.
  • the registration area may be a group of information indicating an area that UE # A10 can move without executing the tracking area update procedure.
  • the registration area may be identified by a TAI list consisting of one or more TAIs.
  • the UE ID is information for identifying the UE.
  • the UE ID is SUCI (SUbscription Concealed Identifier), SUPI (Subscription Permanent Identifier), GUTI (Globally Unique Temporary Identifier), IMEI (International Mobile Subscriber Identity), or IME ISV (IMEI Software Version).
  • SUCI SUbscription Concealed Identifier
  • SUPI Subscribe Permanent Identifier
  • GUTI Globally Unique Temporary Identifier
  • IMEI International Mobile Subscriber Identity
  • IME ISV IMEI Software Version
  • the UE ID may be other information set in the application or network.
  • the UE ID may be information for identifying the user.
  • the Network Slice-Specific Authentication and Authorization function is a function for realizing authentication and authorization peculiar to network slices. With network slice-specific authentication and authorization, UE authentication and authorization can be performed outside the core network such as 3rd Party. PLMN and network devices equipped with the Network Slice-Specific Authentication and Authorization function can execute the Network Slice-Specific Authentication and Authorization procedure for a certain S-NSSAI based on the registration information of the UE. In addition, UEs with the Network Slice-Specific Authentication and Authorization function manage rejected NSSAI for pending for Network Slice-Specific Authentication and Authorization and / or rejected NSSAI for failure of Network Slice-Specific Authentication and Authorization. , And can be memorized. In this paper, Network Slice-Specific Authentication and Authorization may be referred to as network slice-specific authentication and authorization procedures and authentication and authorization procedures.
  • the S-NSSAI that requires Network Slice-Specific Authentication and Authorization is an S-NSSAI that requires Network Slice-Specific Authentication and Authorization, which is managed by the core network and / or the core network device.
  • the core network and / or the core network device requires Network Slice-Specific Authentication and Authorization by storing information indicating whether or not S-NSSAI and Network Slice-Specific Authentication and Authorization are required in association with each other. You may memorize NSSAI.
  • the core network and / or the core network device further includes S-NSSAI that requires Network Slice-Specific Authentication and Authorization, information indicating whether Network Slice-Specific Authentication and Authorization is completed, or Network Slice-Specific.
  • the core network and / or the core network device may manage S-NSSAI that requires Network Slice-Specific Authentication and Authorization as information not related to the access network.
  • Management of the maximum number of UEs connected to a slice is to manage the maximum number of UEs that can be registered in the network slice or S-NSSAI at the same time.
  • the UE registered in the network slice or S-NSSAI may mean that the S-NSSAI indicating the network slice is included in the Allowed NSSAI and stored.
  • Supports the function of managing the maximum number of UEs connected to a slice The device in the network can memorize whether or not the maximum number of UEs connected to a slice needs to be managed for each S-NSSAI, and the registered UEs It can be confirmed during the registration procedure whether or not the maximum number of constants has been reached.
  • each device that supports the function of managing the maximum number of UEs connected to a slice may be able to store the first NSSAI.
  • the maximum number of UEs connected to a slice may be expressed as the maximum number of UEs connected for each slice, the maximum number of UEs that can be registered in a network slice or S-NSSAI, the maximum number of UEs, or a constant. ..
  • the backoff timer is a timer for prohibiting the transmission of MM messages by the UE and / or the start of procedures by SM messages.
  • the backoff timer is managed and executed by the UE.
  • the backoff timer may be associated with S-NSSAI.
  • the UE prohibits, restricts, or restricts the transmission of MM messages and / or the transmission of SM messages using the S-NSSAI while the backoff timer associated with the S-NSSAI is valid. It may be in the state of being done.
  • These regulations may be regulations based on 5GS congestion management, or may be regulations including regulations based on 5GS congestion management.
  • the backoff timer may be a timer that is started and / or stopped in units of S-NSSAI and / or PLMN.
  • the backoff timer may be associated with S-NSSAI, and may be a timer for prohibiting the transmission of MM messages and / or SM messages using a specific S-NSSAI.
  • the UE may be configured not to send MM and / or SM messages using that particular S-NSSAI while this timer is counting.
  • the UE will allow the new PLMN to send MM and / or SM messages that were prohibited by the PLMN before the change, based on certain conditions described below, during the counting of this timer. It may be set. If it is expressed that the transmission of MM message and / or SM message, which was prohibited by PLMN before the change, is allowed, the same S-NSSAI and / as S-NSSAI associated with the backoff timer. Or it is permissible to send MM messages and / or SM messages using S-NSSAI related to the same S-NSSAI and / or S-NSSAI related to the same S-NSSAI mapped S-NSSAI. It may mean.
  • the backoff timer may be a timer for prohibiting the transmission of MM messages using a specific NSSAI.
  • the UE may be configured not to send MM messages using that particular NSSAI and / or NSSAI containing a particular S-NSSAI while this timer is counting.
  • the UE may be set to allow the transmission of MM messages prohibited by the PLMN before the change in the new PLMN based on the specific conditions described later during the counting of this timer. If it is expressed that the transmission of MM messages, which was prohibited by the PLMN before the change, is allowed, the same NSSAI as the NSSAI associated with the backoff timer and / or the S associated with the backoff timer. -It may mean that the transmission of MM messages using NSSAI containing the same S-NSSAI as NSSAI is allowed.
  • NSSAI including S-NSSAI related to S-NSSAI associated with the backoff timer may mean that the transmission of MM messages using NSSAI including S-NSSAI related to the mapped S-NSSAI of S-NSSAI associated with the off-timer is allowed.
  • the backoff timer may be a timer associated with noNSSAI and prohibiting the transmission of the MM message using noNSSAI.
  • UE # A10 may be set not to send an MM message using noNSSAI while this timer is counting.
  • UE # A10 may be configured to allow the new PLMN to send MM messages that were prohibited by the PLMN before the change, based on certain conditions described below, during this timer count. Good.
  • it is expressed that the transmission of the MM message prohibited by the PLMN before the change is permitted it may mean that the MM message using no NSSAI is permitted.
  • the backoff timer may be a 5 GMM timer and / or an EMM (EPS mobility management) timer. Further, the backoff timer may be a timer T3448 or a timer equivalent to the timer T3448. In other words, the backoff timer may be the same timer as the timer for regulating the communication of user data via the control plane, or may be the same timer.
  • EMM EPS mobility management
  • the first identification information is information indicating the network slice that the UE wants to register.
  • the first identification information may be information including one or more S-NSSAI associated with the network slice that the UE wants to register.
  • the S-NSSAI included in the first identification information may be the S-NSSAI included in the configured NSSAI associated with the current PLMN, or the S included in the allowed NSSAI associated with the current PLMN. - May be NSSAI.
  • the first identification information is included in the S-NSSAI associated with the configured NSSAI associated with one or more current PLMNs, or the allowed NSSAI associated with one or more current PLMNs. It may be S-NSSAI or a combination of the above two. More specifically, the allowed NSSAI associated with the current PLMN may be an allowed NSSAI associated with the current PLMN and the current access type. Further, the first identification information may be 5GS Requested NSSAI.
  • the S-NSSAI included in the first identification information may be rejected NSSAI and / or pending NSSAI, and / or S-NSSAI not included in the first NSSAI. Further, the S-NSSAI included in the first identification information may be the S-NSSAI or an S-NSSAI in which the backoff timer associated with the mapped S-NSSAI of the S-NSSAI has not been executed.
  • the second identification information may be information indicating that the UE supports a function for managing the maximum number of UEs connected to the slice.
  • the second identification information may be information indicating whether or not the UE supports a function for managing the maximum number of UEs connected to the slice.
  • the second identification information may be 5GMM capability information.
  • the second identification information may be information indicating that the UE can store it.
  • the tenth identification information may be information indicating S-NSSAI that has reached the maximum number of UEs that can be registered in the network slice or S-NSSAI.
  • the tenth identification information may be included in the Allowed NSSAI transmitted from the network, may be included in the Rejected NSSAI transmitted from the network, or may be included in the Pending NSSAI transmitted from the network. However, information different from these may be transmitted from the network.
  • the tenth identification information may be NSSAI. Further, the tenth identification information may be Allowed NSSAI or Rejected NSSAI. Further, the tenth identification information may be Pending NSSAI or may be a different NSSAI.
  • the tenth identification information may be the first NSSAI or the S-NSSAI included in the first NSSAI.
  • the tenth identification information may be configured to include at least one of the eleventh to fifteenth identification information.
  • the tenth identification information includes the S-NSSAI that has reached the maximum number of UEs that can be registered in the network slice or S-NSSAI, the mapped S-NSSAI of the S-NSSAI, and the network slice or S-NSSAI.
  • the reason value indicating that the maximum number of UEs that can be registered has been reached, the value of the backoff timer indicating the period during which the UE is prohibited from sending the registration request message using the S-NSSAI, and the backoff timer. It may be configured to include at least one or more information indicating the effective range of the above.
  • the tenth identification information is a reason value indicating that the maximum number of UEs that can be registered for the network slice has been reached, and a backoff timer indicating the period during which the transmission of the registration request message using noNSSAI is prohibited. It may be configured to include at least one or more pieces of information indicating a value and the effective range of the backoff timer.
  • the information indicating the effective range of is not included in the tenth identification information, and may be transmitted and received separately.
  • the reason value included in the tenth identification information may be a rejection reason value.
  • the eleventh identification information may be information indicating that the network has reached the maximum number of UEs that can be registered in the network slice or S-NSSAI for the UE, and / or a reason value.
  • the eleventh identification information may be information indicating that the use of S-NSSAI is rejected or restricted because the maximum number of UEs to be connected for each slice has been reached, and / or a reason value.
  • the eleventh identification information is information and a reason value indicating that the use of S-NSSAI is rejected or restricted because the UE has reached the maximum number of UEs to be connected per slice from the network.
  • the eleventh identification information may be included in the tenth identification information, and is shown in the S-NSSAI shown in the fourteenth identification information contained in the same tenth identification information, and / or in the fifteenth identification information. It may be associated with mapped S-NSSAI. The eleventh identification information may be associated with each identification information contained in the same tenth identification information. When the eleventh identification information is included in the rejected NSSAI, the eleventh identification information may be a refusal reason value. The eleventh identification information may be flag information.
  • the eleventh identification information may be a reason value indicating that the connection to the slice is restricted and / or not permitted. Further, the eleventh identification information may be a reason value indicating that registration in the slice is restricted and / or not permitted.
  • the eleventh identification information may be 5GMM (5G Mobility Management) cause. Further, the eleventh identification information may be the 22nd 5GMM cause.
  • the 22nd 5GMM cause may be a reason value indicating congestion. Furthermore, the 22nd 5GMM cause may be information transmitted to the UE due to network congestion.
  • the eleventh identification information may be a 5GMM cause other than the 22nd 5GMM cause.
  • the eleventh identification information may be information transmitted to the UE due to congestion of the network slice. Further, the eleventh identification information may be information transmitted to the UE due to lack of resources in the network slice. Further, the eleventh identification information may be a reason value indicating that the requested service cannot be provided due to insufficient resources for a specific slice.
  • the twelfth identification information may be the value of the backoff timer. Specifically, the twelfth identification information transmits an MM message using the S-NSSAI shown in the fourteenth identification information and / or the fifteenth identification information contained in the ten identification informations in which the UE is the same. It may be information indicating the period during which the network prohibits sending SM messages other than the PDU connection release request message. In other words, the twelfth identification information sends a registration request message using the S-NSSAI shown in the fourteenth identification information and / or the fifteenth identification information contained in the ten identification informations in which the UE is the same. That may be information indicating the period prohibited by the network.
  • the twelfth identification information may be included in the tenth identification information, and is shown in the S-NSSAI shown in the fourteenth identification information contained in the same tenth identification information, and / or in the fifteenth identification information. It may be associated with mapped S-NSSAI.
  • the twelfth identification information may be associated with each identification information contained in the same tenth identification information.
  • the thirteenth identification information is information indicating the effective range of the backoff timer.
  • the thirteenth identification information may be information indicating the effective range of the backoff timer counted by the UE, using the value of the corresponding backoff timer. More specifically, the thirteenth identification information may be information indicating that the corresponding backoff timer is applied to the current PLMN or is applied to all PLMNs. Further or, the thirteenth identification information may be information indicating that it is applied to the current registration area.
  • the thirteenth identification information may be information indicating the scope of regulation or information indicating the scope to which the regulation is applied.
  • the regulation may be a regulation based on congestion management. More specifically, the regulation may limit the sending of UE MM messages. Further, the regulation may be realized by a back-off timer.
  • the thirteenth identification information may be included in the tenth identification information, in which case the value of the corresponding backoff timer is the value indicated by the twelfth identification information contained in the same tenth identification information. good. Further, in that case, the thirteenth identification information may be associated with each identification information contained in the same tenth identification information.
  • the 14th identification information is information indicating S-NSSAI that has reached the maximum number of UEs that can be registered for each S-NSSAI.
  • the 14th identification information may be the S-NSSAI included in the 10th identification information, and is associated with the mapped S-NSSAI shown in the 15th identification information included in the same 10th identification information. Good.
  • the fourteenth identification information may be associated with each identification information contained in the same tenth identification information. Further, the 14th identification information may be S-NSSAI.
  • the fifteenth identification information is the HPLMN S-NSSAI associated with the corresponding S-NSSAI. Specifically, if the current PLMN is not an HPLMN, the fifteenth identification information may be information indicating the HPLMN's S-NSSAI mapped to the current PLMN's S-NSSAI.
  • the fifteenth identification information may be the mapped S-NSSAI included in the tenth identification information, and is associated with the S-NSSAI shown in the fourteenth identification information included in the same tenth identification information. Often, in that case, it may be the mapped S-NSSAI of S-NSSAI shown in the 14th identification information. The fifteenth identification information may be associated with each identification information contained in the same tenth identification information. Further, the fifteenth identification information may be the mapped S-NSSAI of the S-NSSAI indicated by the fourteenth identification information.
  • HSS and UDM, PCF and PCRF, SMF and PGW-C, UPF and PGW-U are the same device (that is, the same physical device).
  • the case where it is configured as hardware, the same logical hardware, or the same software) will be described as an example. However, the content described in this embodiment is also applicable when they are configured as different devices (ie, different physical hardware, or different logical hardware, or different software).
  • data may be transmitted / received directly between them, data may be transmitted / received via the N26 interface between AMF and MME, or data may be transmitted / received via UE.
  • the registration procedure is a procedure for the UE to take the initiative in registering with the access network #B and / or the core network #B and / or the DN.
  • the UE can execute this procedure at any time, for example, when the power is turned on, as long as it is not registered in the network. In other words, the UE can start this procedure at any time if it is in the unregistered state (5GMM-DEREGISTERED state).
  • each device can transition to the registration state (5GMM-REGISTEDED state) based on the completion of the registration procedure.
  • Each registration state may be managed by each device for each access. Specifically, each device may independently manage the registered status (registered or unregistered status) for 3GPP access and the registered status for non-3GPP access.
  • the registration procedure is to update the UE location registration information in the network and / or to periodically notify the network of the UE status from the UE and / or to update certain parameters about the UE in the network. It may be the procedure of.
  • the UE may start the registration procedure when it has mobility across TAs. In other words, the UE may start the registration process when it moves to a TA that is different from the TA shown in the TA list it holds. In addition, the UE may initiate this procedure when the running backoff timer, or other timer, has expired. In addition, the UE may initiate the registration process when the context of each device needs to be updated due to disconnection or invalidation of the PDU session. In addition, the UE may initiate the registration process if there is a change in the ability information and / or preferences regarding the establishment of the UE's PDU session. In addition, the UE may initiate the registration process on a regular basis.
  • the UE may be based on the completion of the UE configuration update procedure, or on the basis of the completion of the registration procedure, or on the basis of the completion of the PDU session establishment procedure, or on the basis of the completion of the PDU session management procedure, or in each procedure.
  • the registration procedure may be initiated based on the information received from the network or based on the expiration or suspension of the backoff timer.
  • the UE is not limited to these, and can execute the registration procedure at any timing.
  • the procedure for transitioning from the state in which the UE is not registered in the network to the state in which it is registered as described above is referred to as an initial registration procedure (initial registration procedure) or a registration procedure for initial registration (registration procedure for initial registration).
  • initial registration procedure initial registration procedure
  • registration procedure for initial registration registration procedure for initial registration
  • the registration procedure executed while the UE is registered in the network can be changed to the registration procedure (registration procedure for mobility and periodic registration update) or the transfer and regular registration procedure (registration procedure for mobility and periodic registration update). Mobility and periodic registration procedure) may be used.
  • the new AMF in Fig. 6 indicates the AMF in which the UE was registered by this procedure
  • the old AMF means the AMF in which the UE was registered by the procedure prior to this procedure. If the AMF is not changed in this procedure, the interface between the old AMF and the new AMF and the procedure between the old AMF and the new AMF do not occur, and the new AMF may be the same device as the old AMF. In the present embodiment, when AMF is described, it may mean new AMF, old AMF, or both.
  • the UE starts the registration procedure by sending a registration request message to new AMF (S600) (S602) (S604). Specifically, the UE sends an RRC message including a registration request message to 5GAN (or gNB) (S600).
  • the registration request message is a NAS message sent and received on the N1 interface. Further, the RRC message may be a control message transmitted / received between the UE and 5GAN (or gNB).
  • NAS messages are processed at the NAS layer, and RRC messages are processed at the RRC layer.
  • the NAS layer is a higher layer than the RRC layer.
  • the UE can send at least one or more identification information out of the first and second identification information by including it in the registration request message and / or the RRC message.
  • the UE may send the registration request message and / or the RRC message with identification information indicating the type of this procedure.
  • the identification information indicating the type of this procedure may be 5GS registration type IE, and this procedure is for initial registration, for updating registration information due to movement, or for periodical update of registration information. Alternatively, it may be information indicating that the registration procedure is for emergency registration.
  • the UE may include the UE capability information in the registration request message in order to notify the network of the functions supported by the UE.
  • the capability information of the UE may be 5G MM capability of 5GS.
  • the UE may send these identification information by including it in a control message different from these, for example, a control message of a layer lower than the RRC layer (for example, MAC layer, RLC layer, PDCP layer).
  • a control message of a layer lower than the RRC layer for example, MAC layer, RLC layer, PDCP layer.
  • the UE may indicate that the UE supports each function, may indicate a request of the UE, or may indicate both of them. ..
  • two or more identification information of these identification information may be configured as one or more identification information.
  • the information indicating the support of each function and the information indicating the request for using each function may be transmitted / received as the same identification information or may be transmitted / received as different identification information.
  • the UE determines whether or not to transmit the first and second identification information to the network, the UE ability information and / or the UE policy, and / or the UE status, and / or the user registration information, and /. Alternatively, it may be selected and decided based on the context held by the UE.
  • the UE may notify the network that it has a function of storing the first NSSAI by transmitting the second identification information.
  • the UE may treat the UE as a UE with the NSSAA function by transmitting the capability information, and may request the network to perform the authentication and approval procedure by the NSSAA function in the procedure related to the UE.
  • NSSAA Network Slice-Specific Authentication and Authorization
  • the UE may store allowed NSSAI and / or configured NSSAI and rejected NSSAI for the requested PLMN for the requested access of the requested PLMN. Furthermore, the UE may also store the mapped S-NSSAI of S-NSSAI included in each NSSAI.
  • the UE may send the second identification information when storing the allowed NSSAI and / or when holding the configured NSSAI for the requested access of the requested PLMN.
  • the UE may select one or more S-NSSAI from the allowed NSSAI and / or configured NSSAI to be stored and include them in the first identification information for transmission. Further, when the UE stores the rejected NSSAI, the S-NSSAI included in the rejected NSSAI may be transmitted without being included in the first identification information.
  • the UE can use the S-NSSAI, if the backoff timer associated with an S-NSSAI is enabled, in other words, if the backoff timer is running, or until the backoff timer is stopped.
  • the S-NSSAI related to the S-NSSAI may be transmitted without being included in the first identification information. Specifically, if the S-NSSAI to which the backoff timer is associated is the required PLMN S-NSSAI, and if the backoff timer is valid, the S-NSSAI is identified as the first identification. You may send it without including it in the information.
  • the UE does not have to include the first identification information in the registration request message if it does not have a valid S-NSSAI. Further, if the UE does not have a valid S-NSSAI, the UE may include a first identification information that does not contain any S-NSSAI in the registration request message. In addition, the UE may include no NSSAI in the registration request message if it does not have a valid S-NSSAI.
  • the effective S-NSSAI may be the above-mentioned S-NSSAI.
  • a valid S-NSSAI may be a stored allowed NSSAI and / or an S-NSSAI included in the configured NSSAI. More specifically, the valid S-NSSAI may be the current PLMN, or the S-NSSAI contained in the allowed NSSAI and / or the configured NSSAI stored in the SNPN (Stand-alone Non-Public Network). .. Further, a valid S-NSSAI may be an S-NSSAI that is not associated with a running backoff timer. In other words, the effective S-NSSAI may be the current PLMN or S-NSSAI that is not regulated by the running backoff timer in the SNPN (Stand-alone Non-Public Network).
  • the UE does not have to include NSSAI in the registration request message.
  • the UE may include no NSSAI in the registration request message.
  • the UE may include NSSAI in the registration request message, which does not contain any S-NSSAI.
  • the NSSAI that does not include any S-NSSAI may be a Requested NSSAI that does not include any S-NSSAI.
  • no NSSAI When expressing that MM message is sent using no NSSAI, it may be possible to send the MM message without including a specific NSSAI, and MM including NSSAI that does not include any S-NSSAI. It may be to send a message, or it may mean both. Furthermore, since the network that received these MM messages does not contain NSSAI and / or S-NSSAI, it may be recognized that it is a request for the default S-NSSAI and / or the default network slice. Good. Therefore, no NSSAI means that the MM message requests information indicating that it does not contain NSSAI and / or information indicating NSSAI that does not contain any S-NSSAI, and / or a default network slice. It may be information.
  • the UE may include the registration request message and / or the RRC message containing the registration request message other than the identification information of the first and second items, for example, including the UE ID and / or the PLMN ID and / or the AMF identification information. You may send it.
  • the AMF identification information may be information for identifying AMF or a set of AMF, for example, 5G-S-TMSI (5G S-Temporary Mobile Subscription Identifier) or GUAMI (Globally Unique AMF Identifier). You can.
  • the UE may also include the SM message (eg, PDU session establishment request message) in the registration request message, or send the SM message (eg, PDU session establishment request message) together with the registration request message.
  • the PDU session establishment procedure may be started during the registration procedure.
  • 5GAN When 5GAN (or gNB) receives an RRC message including a registration request message, it selects the AMF to which the registration request message is forwarded (S602). Note that 5GAN (or gNB) can select AMF based on one or more identification information contained in the registration request message and / or the RRC message including the registration request message. Specifically, the 5GAN (or gNB) may select the new AMF to which the registration request message is sent based on at least one of the first and second identification information.
  • 5GAN may select AMF based on the first identification information.
  • 5GAN may select an AMF included in the network slice identified by S-NSSAI included in the first identification information or having connectivity to the network slice. ..
  • 5GAN (or gNB) has a function for managing the maximum number of UEs connected to the slice and / or a function for managing the maximum number of UEs connected to the slice based on the second identification information.
  • AMF with connectivity to the provided network may be selected.
  • the selection method of AMF is not limited to this, and 5GAN (or gNB) may select AMF based on other conditions. 5GAN (or gNB) extracts the registration request message from the received RRC message and forwards the registration request message to the selected new AMF (S604). If at least one of the first and second identification information is not included in the registration request message but is included in the RRC message, the identification information included in the RRC message is requested to be registered in the selected AMF. It may be forwarded with the message (S604).
  • New AMF receives the registration request message.
  • the new AMF may receive at least one of the first and second identification information together with the registration request message.
  • the registration request message may be a message sent by the UE.
  • the new AMF When the new AMF receives the registration request message, it can execute the first condition determination.
  • the first conditional determination is for determining whether or not the network (or new AMF) accepts the UE request.
  • new AMF executes the procedure from S606 to S612 when the first condition determination is true.
  • new AMF may execute the procedure of S610 without executing the procedure of S606 to S608 when the first condition determination is false.
  • the new AMF may request the UE context from the old AMF and determine the first condition after receiving the UE context from the old AMF (S606, S608). In that case, new AMF executes S610 and S612 if the first condition determination is true. On the other hand, new AMF may execute S610 when the first condition determination is false.
  • the control message transmitted and received by the S610 may be a registration acceptance message, and when the first condition determination is false, it may be a registration acceptance message.
  • the control message transmitted and received by the S610 may be a Registration reject message.
  • the first condition determination is the reception of the registration request message and / or each identification information contained in the registration request message, and / or the subscriber information, and / or the network capability information, and / or the operator policy, and It may be executed based on / or the state of the network and / or the user's registration information and / or the context held by AMF.
  • the first condition determination is true, and if the network does not allow the UE request, the first condition determination may be false. Also, if the network to which the UE is registered and / or the devices in the network support the functions required by the UE, the first condition determination is true and does not support the functions required by the UE. In this case, the first condition determination may be false. Further, if the transmitted / received identification information is permitted, the first conditional determination may be true, and if the transmitted / received identification information is not permitted, the first conditional determination may be false.
  • the AMF further corresponds to the UE by the S-NSSAI Network Slice.
  • the first condition determination may be true if the result of the specificAuthentication and Authorization procedure is remembered to be successful. Alternatively, if there is no S-NSSAI allowed for the UE and there is no plan to assign Allowed NSSAI to the UE in the future, the first condition determination may be false.
  • the first condition determination may be true if it can be expected that Allowed NSSAI will be assigned to the UE in the future.
  • AMF does not have S-NSSAI allowed for UE, and when assigning the first NSSAI to UE, the first condition determination may be true or false.
  • the procedure of S606 and S608 is executed, and the new AMF is added to the AMF identification information included in the message received from the UE. If it is the same as the indicated AMF, the procedure of S606 and S608 is not executed. In other words, if there is a change in AMF due to this procedure, the procedure for S606 and S608 will be executed, and if there is no change in AMF, the procedure for S606 and S608 will be skipped.
  • the UE context transfer procedure (S606, S608) will be explained.
  • the new AMF sends a UE context request message to the old AMF with the AMF indicated in the AMF identification information as the old AMF (S606).
  • the old AMF sends the UE context to the new AMF based on the received UE context request message.
  • New AMF creates a UE context based on the received UE context.
  • the UE context sent from new AMF to old AMF may include UE ID and allowed NSSAI.
  • the UE context may include configured NSSAI and / or rejected NSSAI, NSSAI and / or pending NSSAI, and / or a first NSSAI.
  • allowed NSSAI and / or configured NSSAI and / or rejected NSSAI and / or pending NSSAI and / or the first NSSAI and / or S-NSSAI included in each NSSAI included in the UE context are to the UE.
  • Information on whether or not the notification has been completed may be linked.
  • information on S-NSSAI that requires the Network Slice-Specific Authentication and Authorization procedure, and / or information indicating that the Network Slice-Specific Authentication and Authorization procedure has been completed for the UE and that the authentication has been successful. , And / or information indicating that the authentication has failed may be included.
  • the information of S-NSSAI that requires management of the maximum number of UEs connected to the slice, and / or the information indicating that the maximum number of UEs has been reached, and / or the maximum number of UEs connected to the slice have been reached.
  • Information indicating whether or not it may be included.
  • Information on the characteristics of these S-NSSAIs may be managed as one piece of information. Specifically, whether or not the network requires NSSAA for each S-NSSAI and whether or not NSSAA is successful. , Information indicating whether or not the maximum number of UEs connected to the slice needs to be managed and whether or not the maximum number of UEs connected to the slice has been reached may be stored in association with each other.
  • the new AMF sends a control message to the UE based on the determination of the first condition determination and / or the reception of the UE context from the old AMF (S610).
  • the control message may be a registration acceptance message or a registration refusal message.
  • the new AMF may include one or more tenth identification information in the control message and send it. Alternatively, the new AMF may send the control message including at least one of the 10th to 15th identification information.
  • the AMF may indicate that the network supports each function by transmitting these identification information and / or control messages, or may indicate that the UE request has been accepted. However, it may indicate that the request from the UE is not permitted, or it may indicate information that combines these. Further, when a plurality of identification information is transmitted and received, two or more identification information of these identification information may be configured as one or more identification information.
  • the information indicating the support of each function and the information indicating the request for using each function may be transmitted / received as the same identification information or may be transmitted / received as different identification information.
  • the AMF identifies the 10th to 15th when it receives at least one of the 1st to 2nd identification information from the UE and / or when the UE setting information has been updated since the previous registration procedure. At least one of the information may be transmitted.
  • the AMF may send at least one of the tenth to fifteenth identification information by including it in the control message.
  • AMF may further include configured NSSAI and / or allowed NSSAI, and / or rejected NSSAI, and / or pending NSSAI in the control message.
  • the tenth to fifteenth identification information may be included in the allowed NSSAI and / or rejected NSSAI and / or pending NSSAI and transmitted, or may be transmitted as information different from these.
  • AMF does not allow the UE to perform S-NSSAI (allowed NSSAI) when sending control messages, but if it plans to perform the NSSAA procedure after completing this procedure or in parallel with this procedure, or if the UE and network If the NSSAA procedure is being executed between the two, or if the pending NSSAI is included in the control message and sent, an empty value may be included in the allowed NSSAI and sent.
  • S-NSSAI allowed NSSAI
  • AMF does not allow S-NSSAI (allowed NSSAI) to the UE when sending a control message, but if the 10th identification information is included in the control message, and before this procedure, the 1st NSSAI is notified to the UE. If so, an empty value may be included in Allowed NSSAI and sent.
  • the fifteenth identification information may be included in the control message together.
  • the control message may include one or more identification information among the tenth to fifteenth identification information.
  • the eleventh identification information may indicate that the default S-NSSAI is congested. Further, the eleventh identification information may indicate that the UE cannot send the MM message to no NSSAI. Further, the eleventh identification information may indicate that the UE cannot send an MM message to no NSSAI because the default S-NSSAI is congested. Furthermore, the eleventh identification information may indicate that no NSSAI is congested. Further, the eleventh identification information may indicate that the UE cannot send the MM message to the no NSSAI because the no NSSAI is congested.
  • the AMF may include one or more of the identification information of the 10th to 15th identification information in the control message even when it wants to stop the backoff timer being executed.
  • the eleventh identification information may indicate that the congestion on the default S-NSSAI has been eliminated. Further, the eleventh identification information may indicate that the UE can send an MM message to no NSSAI. Further, the eleventh identification information may indicate that the UE can send an MM message to no NSSAI because the congestion for the default S-NSSAI has been eliminated. Furthermore, the eleventh identification information may indicate that the congestion for no NSSAI has been eliminated. Further, the eleventh identification information may indicate that the UE can send an MM message to no NSSAI because the congestion for no NSSAI has been eliminated.
  • the control message may include one or more identification information among the tenth to fifteenth identification information.
  • the eleventh identification information may indicate that the congestion for the default S-NSSAI has not been resolved. Further, the eleventh identification information may indicate that the UE cannot send the MM message to no NSSAI. Further, the eleventh identification information may indicate that the UE cannot send the MM message to no NSSAI because the congestion for the default S-NSSAI is not cleared. Furthermore, the eleventh identification information may indicate that the congestion for no NSSAI has not been resolved. Further, the eleventh identification information may indicate that the UE cannot send the MM message to no NSSAI because the congestion for no NSSAI is not resolved.
  • the AMF does not have to include the twelfth identification information in the control message.
  • the AMF may include a twelfth identification in the control message indicating the new value.
  • the AMF may include a twelfth identification information when it wants to start the backoff timer.
  • AMF may include one or more of the 10th to 15th identification information in the control message when the default S-NSSAI is congested. Further, the AMF may include one or more of the 10th to 15th identification information in the control message when the UE cannot send the MM message to no NSSAI. In addition, AMF controls one or more of the 10th to 15th identifications when the UE is unable to send an MM message to noNSSAI due to the congestion of the default S-NSSAI. May be included in the message. Further, the AMF may include one or more of the identification information of the 10th to the 15th identification information in the control message when the no NSSAI is congested. In addition, AMF includes one or more of the 10th to 15th identifications in the control message when the UE is unable to send an MM message to noNSSAI due to the congestion of noNSSAI. You can.
  • AMF may include one or more identification information out of the 10th to 15th identification information in the control message when the congestion for the default S-NSSAI is resolved. Further, the AMF may include one or more of the 10th to 15th identification information in the control message when the UE can send an MM message to no NSSAI. In addition, AMF is no longer congested with the default S-NSSAI, so it controls one or more of the 10th to 15th identifications when the UE can send MM messages to noNSSAI. May be included in the message. Further, the AMF may include one or more identification information among the tenth to fifteenth identification information in the control message when the congestion for noNSSAI is resolved. In addition, AMF has eliminated congestion for noNSSAI, so if the UE can send an MM message to noNSSAI, it will include one or more of the 10th to 15th identifications in the control message. You can.
  • AMF may include one or more of the identification information of the 10th to 15th identification information in the control message when the congestion for the default S-NSSAI is not resolved. Further, the AMF may include one or more of the 10th to 15th identification information in the control message when the UE cannot send the MM message to no NSSAI. In addition, AMF does not eliminate congestion for the default S-NSSAI, so it controls one or more of the 10th to 15th identifications when the UE is unable to send an MM message to noNSSAI. May be included in the message. Further, the AMF may include one or more of the identification information of the 10th to the 15th identification information in the control message when the congestion for noNSSAI is not resolved. In addition, AMF does not eliminate congestion for noNSSAI, so if the UE is unable to send an MM message for noNSSAI, it will include one or more of the 10th to 15th identifications in the control message. You can.
  • the fact that the default S-NSSAI is congested may mean that the default slice is congested. More specifically, the fact that the default S-NSSAI is congested may mean that the slices identified by the default S-NSSAI are congested. Further, the fact that no NSSAI is congested may mean that the slices identified by no NSSAI are congested.
  • the AMF may instruct the UE to start the backoff timer by transmitting one or more of the identification information from the 10th to the 15th identification information.
  • the AMF may indicate that the default S-NSSAI is congested by transmitting one or more of the 10th to 15th identifications.
  • the AMF may indicate that the UE cannot send the MM message to no NSSAI by transmitting one or more of the identification information of the tenth to fifteenth identification information.
  • the AMF cannot send MM messages to no NSSAI because the default S-NSSAI is congested by sending one or more of the 10th to 15th identifications. It may be shown that there is.
  • the AMF may indicate that no NSSAI is congested by transmitting one or more identification information out of the tenth to fifteenth identification information.
  • the AMF cannot send the MM message to the no NSSAI because the no NSSAI is congested by sending one or more of the 10th to 15th identification information. May be shown.
  • the AMF may instruct the UE to stop the running backoff timer by transmitting one or more of the 10th to 15th identification information. Furthermore, the AMF may indicate that the congestion on the default S-NSSAI has been eliminated by transmitting one or more of the identification information from the 10th to the 15th identification information. Further, the AMF may indicate that the UE can send an MM message to no NSSAI by transmitting one or more of the identification information of the tenth to fifteenth identification information. In addition, AMF can send MM messages to no NSSAI because the congestion on the default S-NSSAI has been eliminated by sending one or more of the 10th to 15th identification information. It may be shown that there is.
  • the AMF may indicate that the congestion for no NSSAI has been eliminated by transmitting one or more of the identification information from the 10th to the 15th identification information.
  • AMF can send MM messages to no NSSAI because the congestion for no NSSAI has been eliminated by sending one or more of the 10th to 15th identification information. May be shown.
  • the AMF may instruct the UE to extend or shorten the running backoff timer by transmitting one or more of the 10th to 15th identification information. Furthermore, the AMF may indicate that the congestion on the default S-NSSAI has not been resolved by transmitting one or more of the identification information of the 10th to 15th identification information. Further, the AMF may indicate that the UE cannot send the MM message to no NSSAI by transmitting one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the AMF cannot send the MM message to the no NSSAI because the congestion for the default S-NSSAI is not eliminated by transmitting one or more of the identification information from the 10th to the 15th identification information. It may be shown that there is.
  • the AMF may indicate that the congestion for no NSSAI has not been resolved by transmitting one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the AMF cannot send the MM message to no NSSAI because the congestion for no NSSAI is not eliminated by transmitting one or more identification information out of the 10th to 15th identification information. May be shown.
  • the AMF may instruct the UE to stop the running backoff timer by not including the twelfth identification information. Conversely, the AMF may instruct the UE to extend or shorten the running backoff timer by including a twelfth identification that indicates a new value. In addition, the AMF may instruct the UE to start the backoff timer by including the twelfth identification information.
  • the above-mentioned processing may be performed when the UE does not provide NSSAI. Further, the above-mentioned processing may be performed when the UE provides no NSSAI. Further, the above-mentioned processing may be carried out when NSSAI containing no S-NSSAI is provided.
  • the above processing may be performed when NSSAI is not included in the registration request message. Further, the above-mentioned processing may be performed when no NSSAI is included in the registration request message. Further, the above-mentioned processing may be performed when the registration request message contains NSSAI that does not contain any S-NSSAI.
  • the UE receives a control message and / or one or more of the 10th to 15th identification information from the network. More specifically, the UE receives a control message and / or one or more of the 10th to 15th identification information from the new AMF.
  • the UE may recognize the received information based on the reception of at least one of the 10th to 15th identification information. Specifically, since the UE has reached the maximum number of UEs to be connected per slice, the S-NSSAI indicated by the tenth identification information and / or the S-NSSAI indicated by the fourteenth identification information, and / or It may be recognized that the transmission of the MM message and / or the transmission of the SM message using the S-NSSAI related to the mapped S-NSSAI indicated by the fifteenth identification information is temporarily prohibited.
  • the MM procedure may be a registration request message
  • the SM message may be a PDU session establishment request message.
  • the UE may perform the following operations for each of the tenth identification information based on the reception of at least one or more of the tenth to fifteenth identification information and / or the reception of the control message.
  • the UE is the S-NSSAI associated with the S-NSSAI indicated by the 10th identification information and / or the S-NSSAI indicated by the 14th identification information and / or the mapped S-NSSAI indicated by the 15th identification information. May be included and stored in the appropriate first NSSAI. Specifically, the UE transfers the received S-NSSAI indicated by the 14th identification information to the 1st NSSAI associated with the information indicated by the 11th identification information and / or the 13th identification information. You may add it.
  • the UE may add the mapped S-NSSAI indicated by the received 15th identification information to the first NSSAI, or the S-NSSAI regarding the mapped S-NSSAI indicated by the received 15th identification information. May be added to the first NSSAI associated with the current PLMN, may be added to the first NSSAI associated with the current PLMN and the current access type, or with the current PLMN. It may be added to the first NSSAI (s) associated with all access types.
  • Allowed NSSAI may be deleted from the S-NSSAI.
  • the UE may store the S-NSSAI indicated by the 15th identification information as the mapped S-NSSAI of the S-NSSAI indicated by the 14th identification information.
  • the UE When the received 13th identification information is information indicating that it is applied to all PLMNs, the UE is mapped from the allowed NSSAI corresponding to the PLMN other than the current PLMN, which is indicated by the 15th identification information. S-NSSAI related to S-NSSAI may be deleted.
  • the UE is the maximum number of UEs to which the S-NSSAI shown in the 10th identification information is connected for each slice based on the reception of the 10th identification information and / or the 11th identification information and / or the reception of the control message. You may recognize that you have reached.
  • the S-NSSAI shown in the tenth identification information may be the S-NSSAI shown in the fourteenth identification information and / or the mapped S-NSSAI shown in the fifteenth identification information.
  • the UE was associated with S-NSSAI using the value of the backoff timer received based on the reception of at least one or more of the 10th to 15th identifications and / or the reception of the control message.
  • the backoff timer may be counted, the backoff timer may be started, or the backoff timer may be managed.
  • the value of the backoff timer may be the value of the timer shown in the tenth identification information and / or the twelfth identification information
  • the S-NSSAI is the first identification information and / or. It may be the S-NSSAI shown in the tenth identification information and / or the fourteenth identification information, and / or the mapped S-NSSAI shown in the fifteenth identification information.
  • the UE While the backoff timer is running, the UE is either S-NSSAI associated with the backoff timer, mapped S-NSSAI associated with the backoff timer, or mapped S-NSSAI associated with the backoff timer.
  • the transmission of MM messages and SM messages using S-NSSAI related to the above may be prohibited.
  • the UE may adapt the backoff timer according to the effective range shown in the thirteenth identification information.
  • the UE may apply the backoff timer in the current PLMN. Specifically, with the PLMN change, the UE does not have to stop the backoff timer count or the backoff timer, but it is regulated by the backoff timer associated with the PLMN before the move. May be released. In other words, if the PLMN is changed, the UE will maintain the backoff timer, but the restrictions on the PLMN before the move may be lifted.
  • the UE may stop the count of the backoff timer associated with the current PLMN or the backoff timer due to the change of the PLMN.
  • the UE may stop the backoff timer when the PLMN is changed, and the restriction on the PLMN before the move may be lifted.
  • the UE may apply the backoff timer to all PLMNs. In other words, the UE may not stop and maintain the backoff timer in the event of a PLMN change. If a PLMN change occurs while the backoff timer is running, the UE will see the S-NSSAI of the destination PLMN associated with the mapped S-NSSAI of the S-NSSAI to which the backoff timer was associated. , Or the S-NSSAI of the destination PLMN related to the mapped S-NSSAI, or the MM message and SM message using the mapped S-NSSAI may be maintained in a prohibited state.
  • the UE may apply the backoff timer in the current registration area. In other words, as the UE leaves the registration area, the UE may stop the count of the backoff timer or the backoff timer.
  • the UE may manage and / or store the eleventh identification information and / or the first NSSAI associated with the thirteenth identification information.
  • the restriction is lifted, and the UE is S-NSSAI to which the backoff timer is associated and / or mapped S-NSSAI to which the backoff timer is associated.
  • You may transition to the state where you can send MM messages and SM messages using S-NSSAI and / or mapped S-NSSAI to which the backoff timer is associated.
  • the UE upon stopping or expiring the backoff timer, the UE will see S-NSSAI with which the backoff timer was associated and / or S-NSSAI with respect to mapped S-NSSAI with which the backoff timer was associated.
  • / or the mapped S-NSSAI to which the backoff timer is associated may be used for the Requested NSSAI to transition to a state in which the MM message can be transmitted.
  • the UE may transition to a state in which it is possible to send an MM message using NSSAI associated with the backoff timer when the backoff timer is stopped or expires.
  • the UE may transition to a state in which the NSSAI associated with the backoff timer can be used as the Requested NSSAI to send an MM message when the backoff timer is stopped or expired.
  • the UE starts from the first NSSAI, S-NSSAI to which the backoff timer is associated, or mapped S-NSSAI to which the backoff timer is associated, or The S-NSSAI related to the mapped S-NSSAI to which the backoff timer is associated may be deleted.
  • the UE may start the backoff timer based on the reception of a control message and / or one or more of the 10th to 15th identification information. Further, the UE may set the twelfth identification information to the timer value of the backoff timer based on the reception of the control message and / or one or more of the identification information of the tenth to fifteenth. Good. In other words, the UE initiates a backoff timer at the value indicated by the twelfth identity based on the control message and / or receipt of one or more of the tenth to fifteenth identifications. May be good.
  • no NSSAI may be associated with the backoff timer. Further, when the UE provides noNSSAI to the network, the UE may associate noNSSAI with the backoff timer. Further, when the UE provides the network with NSSAI that does not include any S-NSSAI, the UE may associate noNSSAI with the backoff timer.
  • the backoff timer may be associated with no NSSAI.
  • the NSSAI associated with the backoff timer may be no NSSAI.
  • the UE may associate the backoff timer with no NSSAI.
  • the backoff timer may be associated with no NSSAI.
  • the NSSAI associated with the backoff timer may be no NSSAI.
  • the UE may associate the backoff timer with no NSSAI if the UE provides no NSSAI with a registration request message.
  • the backoff timer may be associated with noNSSAI.
  • the NSSAI associated with the backoff timer may be no NSSAI.
  • the UE may associate the backoff timer with no NSSAI.
  • the backoff timer may be associated with NSSAI received from the network and / or S-NSSAI. In other words, if the UE did not provide the NSSAI with the registration request message and / or no NSSAI, and / or provided the NSSAI without any S-NSSAI. Also, the NSSAI associated with the backoff timer may be an NSSAI received from the network and / or an S-NSSAI.
  • the UE may associate the backoff timer with the NSSAI and / or S-NSSAI received from the network.
  • the UE may perform the above behavior based on the reception of a control message and / or one or more of the 10th to 15th identification information.
  • the UE's transmission of MM request messages that do not use NSSAI may or may not be permitted.
  • the UE may or may not be allowed to send MM request messages using noNSSAI.
  • the UE may or may not be allowed to send MM request messages using NSSAI that does not contain any S-NSSAI. Good.
  • the UE may send MM request messages using a particular NSSAI and / or S-NSSAI, even while the backoff timer associated with noNSSAI is running. , May be permitted.
  • the specific NSSAI may be an NSSAI including one or more S-NSSAI.
  • the UE may be prohibited from sending MM request messages that do not include NSSAI.
  • the UE may be prohibited from sending MM request messages containing no NSSAI while the backoff timer associated with no NSSAI is running.
  • the UE may be prohibited from sending MM request messages containing NSSAI that does not contain any S-NSSAI.
  • the UE sends MM request messages without NSSAI and / or certain NSSAI and / Alternatively, the transmission of the MM request message using S-NSSAI may or may not be permitted.
  • the UE sends an MM request message using noNSSAI and / or a particular NSSAI and / or / Or the transmission of the MM request message using S-NSSAI may or may not be permitted.
  • the UE sends MM request messages using NSSAI that does not contain any S-NSSAI, and / Or the transmission of MM request messages using a particular NSSAI and / or S-NSSAI may or may not be permitted.
  • the UE's transmission of the MM request message without using NSSAI may mean that the UE transmits the MM request message without NSSAI.
  • the UE's transmission of the MM request message using no NSSAI may mean that the UE transmits an MM request message including no NSSAI.
  • the UE's MM request message using NSSAI that does not contain any S-NSSAI may mean that the UE sends an MM request message that contains NSSAI that does not contain any S-NSSAI. ..
  • the UE's transmission of an MM request message using a specific NSSAI and / or S-NSSAI means that the UE transmits an MM request message containing a specific NSSAI and / or S-NSSAI. You may.
  • the MM request message may be a registration request message and / or a service request message, and may be an MM message.
  • the UE may receive a control message that does not include the twelfth identification information.
  • the UE may receive a control message containing a twelfth identification information indicating the new value.
  • the network wants to start the UE's backoff timer, the UE may receive a control message containing a twelfth identification.
  • the UE may receive one or more of the 10th to 15th identification information when the default S-NSSAI is congested. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when the MM message to no NSSAI cannot be transmitted. In addition, the UE receives one or more of the 10th to 15th identifications when it is unable to send an MM message to noNSSAI because the default S-NSSAI is congested. May be good. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when no NSSAI is congested. Further, the UE may receive one or more of the identification information of the tenth to the fifteenth when the MM message to the noNSSAI cannot be transmitted because the noNSSAI is congested.
  • the UE may receive one or more of the 10th to 15th identification information when the congestion on the default S-NSSAI is resolved. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when the MM message to no NSSAI can be transmitted. In addition, the UE is no longer congested with the default S-NSSAI, so if it is possible to send an MM message to no NSSAI, it will receive one or more of the 10th to 15th identifications. May be good. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when the congestion for noNSSAI is resolved. Further, since the congestion on no NSSAI has been eliminated, the UE may receive one or more of the identification information of the tenth to fifteenth when the MM message for no NSSAI can be transmitted.
  • the UE may receive one or more of the identification information of the 10th to 15th identification information when the congestion for the default S-NSSAI is not resolved. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when the MM message to no NSSAI cannot be transmitted. In addition, the UE does not clear the congestion for the default S-NSSAI, so if it is unable to send an MM message to no NSSAI, it will receive one or more of the 10th to 15th identifications. May be good. Further, the UE may receive one or more identification information out of the tenth to fifteenth identification information when the congestion for noNSSAI is not resolved. Further, since the congestion for no NSSAI is not resolved, the UE may receive one or more of the identification information of the tenth to fifteenth when the MM message for no NSSAI cannot be transmitted.
  • the UE may start the backoff timer by receiving one or more of the identification information from the 10th to the 15th identification information. Further, the UE may authenticate that the default S-NSSAI is congested by receiving one or more of the identification information of the tenth to fifteenth identification information. Further, the UE may authenticate that the MM message to no NSSAI cannot be transmitted by receiving one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the UE cannot send the MM message to no NSSAI because the default S-NSSAI is congested by receiving one or more of the 10th to 15th identification information. May be authenticated.
  • the UE may authenticate that no NSSAI is congested by receiving one or more identification information out of the tenth to fifteenth identification information. Furthermore, the UE authenticates that it is not possible to send an MM message to no NSSAI because no NSSAI is congested by receiving one or more of the identification information from the 10th to 15th identification information. You may.
  • the UE may stop the running backoff timer by receiving one or more of the identification information from the 10th to the 15th identification information. Further, the UE may authenticate that the congestion on the default S-NSSAI has been eliminated by receiving one or more of the identification information of the tenth to fifteenth identification information. Further, the UE may authenticate that it is possible to send an MM message to no NSSAI by receiving one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the UE can send an MM message to no NSSAI because the congestion for the default S-NSSAI has been eliminated by receiving one or more of the 10th to 15th identification information. May be authenticated.
  • the UE may authenticate that the congestion on no NSSAI has been eliminated by receiving one or more of the identification information from the 10th to the 15th identification information. Furthermore, the UE authenticates that it is possible to send an MM message to no NSSAI because the congestion for no NSSAI has been eliminated by receiving one or more of the identification information from the 10th to 15th identification information. You may.
  • the UE may extend or shorten the running backoff timer by receiving one or more of the identification information from the 10th to the 15th identification information. Furthermore, the UE may authenticate that the congestion on the default S-NSSAI has not been resolved by receiving one or more of the identification information of the 10th to 15th identification information. Further, the UE may authenticate that the MM message to no NSSAI cannot be transmitted by receiving one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the UE cannot send the MM message to no NSSAI because the congestion for the default S-NSSAI is not resolved by receiving one or more of the identification information from the 10th to the 15th identification information. May be authenticated.
  • the UE may authenticate that the congestion for no NSSAI has not been resolved by receiving one or more of the identification information of the tenth to fifteenth identification information. Furthermore, the UE authenticates that it is not possible to send the MM message to no NSSAI because the congestion for no NSSAI is not resolved by receiving one or more of the identification information from the 10th to 15th identification information. You may.
  • the UE may stop the running backoff timer by receiving a control message that does not include the twelfth identification information. Conversely, the UE may extend or shorten the running backoff timer by receiving a control message containing a twelfth identification information indicating a new value. Further, the UE may start the backoff timer by receiving the control message including the twelfth identification information.
  • each process that the UE shown above executes based on the reception of each identification information may be executed during or after the completion of this procedure, or may be executed based on the completion of this procedure after the completion of this procedure. Good.
  • the AMF determines which of the 10th to 15th identification information is included in the control message, each of the received identification information and / or the subscriber information, and / or the network capability information, and / or. Selections and decisions may be made based on operator policy and / or network status and / or user registration information and / or context held by AMF.
  • the AMF either sends the registration acceptance message with the SM message (eg, PDU session establishment acceptance message), or sends the SM message along with the registration acceptance message (eg, PDU session establishment). Acceptance message) can be sent.
  • this transmission method may be executed when the SM message (for example, the PDU session establishment request message) is included in the registration request message. Further, this transmission method may be executed when an SM message (for example, a PDU session establishment request message) is transmitted together with the registration request message. By performing such a transmission method, AMF can indicate that the procedure for SM has been accepted in the registration procedure.
  • AMF also receives each identification information and / or subscriber information and / or network capability information and / or operator policy and / or network status and / or user registration information and / or It may be shown that the UE request has been accepted by sending the registration acceptance message based on the context held by the AMF, or the UE request has been rejected by sending the registration refusal message. May be indicated.
  • the UE receives the control message via 5GAN (gNB) (S608).
  • the control message is a registration acceptance message
  • the UE recognizes that the UE request by the registration request message has been accepted and the contents of various identification information contained in the registration acceptance message by receiving the registration acceptance message. can do.
  • the control message is a registration refusal message
  • the UE receives the registration refusal message, so that the UE's request by the registration request message is rejected, and the contents of various identification information included in the registration refusal message. Can be recognized.
  • the UE may recognize that the request of the UE has been rejected if the control message is not received even after a predetermined period of time has elapsed after transmitting the registration request message.
  • the UE can further send a registration completion message to AMF via 5GAN (gNB) as a response message to the registration acceptance message when the control message is a registration acceptance message (S610).
  • gNB 5GAN
  • the UE may send the registration completion message including the SM message such as the PDU session establishment completion message, or by including the SM message. , May indicate that the procedure for SM has been completed.
  • the registration completion message is a NAS message sent and received on the N1 interface, but is included in the RRC message and sent and received between the UE and 5GAN (gNB).
  • AMF receives a registration completion message via 5GAN (gNB) (S612).
  • gNB 5GAN
  • each device completes this procedure based on the transmission / reception of the registration acceptance message and / or the registration completion message.
  • each device may complete the registration procedure based on the transmission and reception of the registration refusal message.
  • each device transitions or maintains the state in which the UE is registered in the network (RM # REGISTERED state or 5GMM-REGISTERED state) based on the transmission / reception of the registration acceptance message and / or the registration completion message.
  • the UE goes to the state where it is not registered in the network (RM # DEREGISTERED state or 5GMM-DEREGISTERED state) on the access that received the registration refusal message to the current PLMN. Transitions or maintenance may be carried out. Further, the transition of each device to each state may be performed based on the transmission / reception of the registration completion message or the completion of the registration procedure.
  • each device may perform processing based on the information sent and received in the registration procedure based on the completion of the registration procedure. For example, when sending and receiving information indicating that a part of the UE's request has been rejected, the reason why the UE's request has been rejected may be recognized. Further, each device may perform this procedure again based on the reason why the UE request is rejected, or may perform the registration procedure for core network #A or another cell.
  • the UE may store the identification information received with the registration acceptance message and / or the registration refusal message based on the completion of the registration procedure, or may recognize the network decision.
  • each device may start the registration procedure again based on the expiration or stop of the backoff timer.
  • Embodiment in the present invention may be a combination of procedures described in one or more chapters three.
  • one or more transfer and periodic registration procedures may be performed after the completion of the initial registration procedure.
  • the UE may send an MM message or SM message using S-NSSAI associated with the backoff timer based on the expiration or stop of the backoff timer.
  • One or more MM procedures and SM procedures may be executed before and after the completion of the initial registration procedure and in parallel.
  • the program that operates in the apparatus according to the present invention may be a program that controls the Central Processing Unit (CPU) or the like to operate the computer so as to realize the functions of the embodiments according to the present invention.
  • the program or information handled by the program is temporarily stored in volatile memory such as Random Access Memory (RAM), non-volatile memory such as flash memory, Hard Disk Drive (HDD), or other storage device system.
  • volatile memory such as Random Access Memory (RAM), non-volatile memory such as flash memory, Hard Disk Drive (HDD), or other storage device system.
  • the program for realizing the function of the embodiment according to the present invention may be recorded on a computer-readable recording medium. It may be realized by loading the program recorded on this recording medium into a computer system and executing it.
  • the "computer system” as used herein is a computer system built into a device, and includes hardware such as an operating system and peripheral devices.
  • the "computer-readable recording medium” is a semiconductor recording medium, an optical recording medium, a magnetic recording medium, a medium that dynamically holds a program for a short time, or another recording medium that can be read by a computer. Is also good.
  • each functional block or various features of the device used in the above-described embodiment can be implemented or executed in an electric circuit, for example, an integrated circuit or a plurality of integrated circuits.
  • Electrical circuits designed to perform the functions described herein are general purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or others. Programmable logic devices, discrete gate or transistor logic, discrete hardware components, or a combination thereof.
  • the general purpose processor may be a microprocessor, a conventional processor, a controller, a microcontroller, or a state machine.
  • the electric circuit described above may be composed of a digital circuit or an analog circuit. Further, when an integrated circuit technology that replaces the current integrated circuit appears due to the progress of semiconductor technology, one or a plurality of aspects of the present invention can use a new integrated circuit according to the technology.
  • the invention of the present application is not limited to the above-described embodiment.
  • an example of the device has been described, but the present invention is not limited to this, and the present invention is not limited to this, and a stationary or non-movable electronic device installed indoors or outdoors, for example, an AV device or a kitchen device. It can be applied to terminal devices or communication devices such as cleaning / washing equipment, air conditioning equipment, office equipment, vending machines, and other living equipment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Des procédures d'enregistrement initial et d'enregistrement périodique ou à base de mouvement d'un UE, et un moyen de communication sont divulgués, chacun étant destiné à réaliser la gestion du nombre maximal d'UE connectés pour chaque tranche dans un 5GS. L'invention concerne en outre : un procédé de gestion d'un temporisateur qui s'exécute après l'achèvement d'une procédure d'enregistrement ; un procédé d'enregistrement d'un UE dans lequel un temporisateur est en cours de fonctionnement et un UE dans lequel un temporisateur n'est pas en cours de fonctionnement ; et un moyen de communication. De plus, même lorsque des informations de tranche ne sont pas fournies par un UE dans une procédure d'enregistrement, la fourniture du procédé de gestion de temporisateur et d'un procédé de commande de communication permet d'obtenir une fonction se rapportant à la gestion du nombre maximal d'UE connectés pour chaque tranche dans un 5GS.
PCT/JP2020/048535 2019-12-27 2020-12-24 Ue, dispositif de commande et procédé de commande de communication WO2021132502A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2021567637A JPWO2021132502A1 (fr) 2019-12-27 2020-12-24

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2019-238128 2019-12-27
JP2019238128 2019-12-27

Publications (1)

Publication Number Publication Date
WO2021132502A1 true WO2021132502A1 (fr) 2021-07-01

Family

ID=76575536

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/048535 WO2021132502A1 (fr) 2019-12-27 2020-12-24 Ue, dispositif de commande et procédé de commande de communication

Country Status (2)

Country Link
JP (1) JPWO2021132502A1 (fr)
WO (1) WO2021132502A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7256339B1 (ja) * 2022-08-19 2023-04-11 株式会社インターネットイニシアティブ 方法、情報処理装置、およびシステム

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MEDIATEK INC.: "Correction of S-NSSAI based congestion control", 3GPP TSG-CT WG1#119, C1-194588, 19 August 2019 (2019-08-19), XP051763217 *
NEC: "Solution KI#1: Max number of UEs per Network Slice control at registration", 3GPP TSG-SA WG2#136, S2-1912476, 22 November 2019 (2019-11-22), XP051828404 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7256339B1 (ja) * 2022-08-19 2023-04-11 株式会社インターネットイニシアティブ 方法、情報処理装置、およびシステム
WO2024038576A1 (fr) * 2022-08-19 2024-02-22 株式会社インターネットイニシアティブ Procédé, dispositif de traitement d'informations, et système

Also Published As

Publication number Publication date
JPWO2021132502A1 (fr) 2021-07-01

Similar Documents

Publication Publication Date Title
WO2021132505A1 (fr) Équipement utilisateur (ue)
WO2021215228A1 (fr) Équipement utilisateur (ue) et fonction de gestion d'accès et de mobilité (amf)
WO2021205955A1 (fr) Équipement utilisateur (ue) et procédé de communication pour un ue
WO2021241114A1 (fr) Équipement utilisateur (ue), dispositif de réseau central, fonction de gestion d'accès et de mobilité (amf) et fonction de gestion de sessions (smf)
WO2021060383A1 (fr) Dispositif d'utilisateur et dispositif de réseau central
WO2022097703A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication effectué par l'ue
WO2022097702A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication exécuté par l'ue
WO2022004699A1 (fr) Équipement d'utilisateur (ue) et procédé de commande de communication pour ue
WO2021132288A1 (fr) Équipement Utilisateur (UE)
WO2021132502A1 (fr) Ue, dispositif de commande et procédé de commande de communication
WO2021085568A1 (fr) Ue (équipement utilisateur)
JP2021166360A (ja) UE(User Equipment)
WO2021132287A1 (fr) Équipement Utilisateur (UE)
WO2022004700A1 (fr) Équipement utilisateur (ue) et procédé de communication pour ue
WO2022030473A1 (fr) Équipement utilisateur (ue)
WO2021132506A1 (fr) Équipement utilisateur (ue)
WO2022097701A1 (fr) Équipement utilisateur (ue) et procédé de commande de communication réalisé par l'ue
WO2021215227A1 (fr) Ue (équipement utilisateur)
WO2023248883A1 (fr) Équipement utilisateur (ue)
WO2021085570A1 (fr) Équipement utilisateur (ue)
WO2022154062A1 (fr) Équipement utilisateur (ue)
WO2024048398A1 (fr) Équipement d'utilisateur (ue)
WO2023248884A1 (fr) Équipement utilisateur (ue)
WO2023210479A1 (fr) Équipement utilisateur (ue)
WO2022030474A1 (fr) Ue (équipement d'utilisateur)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20904435

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2021567637

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20904435

Country of ref document: EP

Kind code of ref document: A1