WO2021134377A1 - Appareil et procédé d'accès à une tranche de réseau - Google Patents

Appareil et procédé d'accès à une tranche de réseau Download PDF

Info

Publication number
WO2021134377A1
WO2021134377A1 PCT/CN2019/130218 CN2019130218W WO2021134377A1 WO 2021134377 A1 WO2021134377 A1 WO 2021134377A1 CN 2019130218 W CN2019130218 W CN 2019130218W WO 2021134377 A1 WO2021134377 A1 WO 2021134377A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification information
access network
terminal device
network device
target
Prior art date
Application number
PCT/CN2019/130218
Other languages
English (en)
Chinese (zh)
Inventor
黄曲芳
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2019/130218 priority Critical patent/WO2021134377A1/fr
Priority to CN201980098916.6A priority patent/CN114175727B/zh
Publication of WO2021134377A1 publication Critical patent/WO2021134377A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This application relates to the field of communication technology, and in particular to a method and device for accessing network slices.
  • the 3rd generation partnership project (3GPP) introduced the concept of network slicing to the access network.
  • a physical network is divided into multiple logical networks supporting different services.
  • the network is a network slice, and a cell of an access network supports terminal devices within the cell range of the access network to access certain network slices.
  • the access network device needs to send network slice list information to terminal devices within the cell range managed by the access network device through a system information broadcast (SIB) message, and the network slice list information includes the terminal device Which network slices can be accessed in the cell of the access network, or which network slices cannot be accessed.
  • SIB system information broadcast
  • a terminal device accesses a network slice, it needs to read the SIB, and based on the SIB, determine whether the cell in which the terminal device is located supports the terminal device to access the network slice. If it supports, the terminal device initiates a connection request to the access network device that manages the cell; if not, the terminal device searches for other cells.
  • the access network device regularly broadcasts network slice list information on the air interface.
  • the network slice list information is broadcast on the air interface regularly, which consumes a lot of resources. .
  • the access network device broadcasts the network slice list information on the air interface when it receives a request from the terminal device to obtain network slice list information.
  • the terminal device selects a cell of the access network every time It is necessary to request to obtain the network slice list information supported by the cell, and then determine whether the network slice can be accessed. The time is prolonged and the terminal equipment consumes more power.
  • the embodiments of the present application provide methods and devices for accessing network slicing, which are helpful to save network resources, improve the efficiency of terminal equipment accessing network slicing, and reduce the energy consumption of terminal equipment.
  • the following technical solutions are adopted in the embodiments of the present application:
  • a method for accessing a network slice is provided, which is applied to a terminal device.
  • the method includes: sending identification information of a target network slice to an access network device, where the access network device is an access network accessed by the terminal device equipment.
  • the identification information of the target network slice is used for the access network device to obtain the identification information of the target cell to obtain the identification information of the terminal device.
  • the target cell is a cell that supports the target network slice.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell. Receive the identification information of the terminal device sent by the access network device. Access the target network slice according to the identification information of the terminal device.
  • the first access network device is an access network device that manages the current cell, and the current cell is the cell accessed by the terminal device.
  • the current cell does not support the target network slice.
  • the terminal device can access the target network slice.
  • the terminal device does not need to send a request to the first access network device to obtain the list information of the network slices supported by the accessed cell, and determine whether the cell where the terminal device is located supports the target network slice.
  • the efficiency of terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
  • the identification information of the target network slice is carried in the radio resource control RRC connection establishment complete message.
  • a method for accessing a network slice which is applied to a first access network device, and the method includes: receiving identification information of a target network slice sent by a terminal device accessing the first access network device. Obtain the identification information of the target cell according to the identification information of the target network slice.
  • the target cell is a cell that supports the target network slice.
  • the identification information of the terminal device is determined.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the identification information of the terminal device is used for the terminal device to access the target network slice.
  • the access network device does not need to broadcast the network slice list information, and the terminal device can access the target network slice.
  • the occupation of air interface broadcast resources by the network slice list information is reduced. It saves network resources, improves the efficiency of terminal equipment accessing the target network slice, and reduces the energy consumption of the terminal equipment.
  • determining the identification information of the terminal device according to the identification information of the target cell specifically includes: determining the second access network device according to the identification information of the target cell.
  • the second access network device is an access network device that manages the target cell. Send the identification information of the target network slice to the second access network device.
  • the identification information of the target network slice is used by the second access network device to determine that the terminal device is allowed to access the target network slice. After the second access network device determines that the terminal device is allowed to access the target network slice, the second access network device determines that the terminal device is allowed to access the target network slice.
  • the network device allocates the identification information of the terminal device to the terminal device.
  • the access network device does not need to broadcast the network slice list information, and the terminal device can access the target network slice.
  • the occupation of air interface broadcast resources by the network slice list information is reduced. It saves network resources, improves the efficiency of terminal equipment accessing the target network slice, and reduces the energy consumption of the terminal equipment.
  • a method for accessing network slicing is provided, which is applied to a second access network device, and the second access network device is an access network device that manages a target cell.
  • the target cell is a cell that supports the target network slice.
  • the method includes: receiving identification information of a target network slice sent by a first access network device.
  • the first access network device is the access network device accessed by the terminal device.
  • the target network slice is the network slice that the terminal device requests to access.
  • the identification information of the target network slice it is determined that the terminal device is allowed to access the target network slice. Assign the terminal device's identification information to the terminal device.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the identification information of the terminal device is sent to the first access network device, where the identification information of the terminal device is used for the terminal device to access the target network slice.
  • the current cell is a cell managed by the first access network device.
  • the current cell is the cell accessed by the terminal device.
  • the current cell does not support the target network slice. In this way, the access network device does not need to broadcast the network slice list information, and the terminal device can access the target network slice.
  • the occupation of air interface broadcast resources by the network slice list information is reduced. It saves network resources, improves the efficiency of terminal equipment accessing the target network slice, and reduces the energy consumption of the terminal equipment.
  • a method for accessing network slicing which is applied to a first access network device, and the method includes: receiving identification information of the terminal device and a target cell sent by a terminal device accessing the first access network device ⁇ identification information.
  • the target cell is a cell that supports the target network slice.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the second access network device is determined according to the identification information of the target cell; the second access network device is an access network device that manages the target cell.
  • a channel is established between the first access network device and the second access network device, and the channel is used for the terminal device to access the target through the first access network device and the second access network device Network slicing.
  • the terminal device does not need to re-establish the RRC connection with the second access network device.
  • the efficiency of terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
  • establishing a channel between the first access network device and the second access network device according to the identification information of the terminal device specifically includes: The identification information allocates the first interface to the terminal device.
  • the first interface is used by the first access network device to receive the service sent by the second access network device to the terminal device.
  • the second access network device is an access network device that manages the target cell. Send the identification information of the first interface and the identification information of the terminal device to the second access network device, so that the second access network device stores the identification information of the first interface, and according to the identification information of the terminal device, it is the terminal device Assign the second interface.
  • the second interface is used for the second access network device to receive the service from the terminal device sent by the first access network device. Receiving the identification information of the second interface sent by the second access network device; storing the identification information of the second interface.
  • the method further includes: receiving, through the channel, the service sent by the second access network device to the terminal device. Send the service to the terminal device.
  • a method for accessing network slicing is provided, which is applied to a second access network device, and the second access network device is an access network device that manages a target cell.
  • the target cell is a cell that supports the target network slice.
  • the method includes: receiving identification information of a first interface and identification information of a terminal device sent by a first access network device.
  • the first access network device is the access network device accessed by the terminal device.
  • the first interface is used by the first access network device to receive the service sent by the second access network device to the terminal device.
  • the first interface is an interface allocated by the first access network device to the terminal device.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell. Store the identification information of the first interface.
  • the second interface is allocated to the terminal device.
  • the second interface is used for the second access network device to receive the service from the terminal device sent by the first access network device. Send the identification information of the second interface to the first access network device, so that the first access network device stores the identification information of the second interface.
  • the first interface and the second interface are used for the terminal device to access the target network slice through the first access network device and the second access network device. In this way, the terminal device does not need to re-establish the RRC connection with the second access network device. The efficiency of terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
  • the method further includes: sending the service of the terminal device to the first interface of the first access network device, so that the first access network device The network access device sends the terminal device's service to the terminal device.
  • a terminal device is provided, and the terminal device can be used to execute any method of the foregoing first aspect or any method provided in any possible implementation manner of the first aspect.
  • the terminal device may be divided into functional modules according to any of the methods provided in the first aspect.
  • each functional unit can be divided corresponding to each function, or two or more functions can be integrated into one processing unit.
  • the terminal device may include a processor, and the processor is configured to execute the Either method.
  • a computer-readable storage medium such as a non-transitory computer-readable storage medium.
  • a computer program (or instruction) is stored thereon, and when the computer program (or instruction) runs on a computer, the computer is caused to execute any of the above-mentioned first aspect or any one of the possible implementations of the first aspect. method.
  • a computer program product which when running on a computer, enables any method provided by the first aspect or any one of the possible implementations of the first aspect to be executed.
  • a chip including: a processor, configured to call and run a computer program stored in the memory from a memory, and execute any of the first aspect or any one of the possible implementation manners of the first aspect. a way.
  • an access network device is provided, and the access network device can be used to execute any method provided in any possible implementation manner of the second aspect to the fifth aspect.
  • the access network device may be a base station or the like.
  • the access network can be accessed according to any method provided in any one of the foregoing second to fifth aspects.
  • the equipment is divided into functional modules.
  • each functional unit can be divided corresponding to each function, or two or more functions can be integrated into one processing unit.
  • the access network device may include a processor, and the processor is configured to execute the foregoing second aspect to Any method provided in any possible implementation manner of the fifth aspect.
  • a computer-readable storage medium such as a non-transitory computer-readable storage medium.
  • a computer program (or instruction) is stored thereon, and when the computer program (or instruction) runs on a computer, the computer executes any one of the possible implementations of the second aspect to the fifth aspect.
  • a computer program product which when running on a computer, enables any one of the methods provided in any one of the possible implementation manners of the second aspect to the fifth aspect to be executed.
  • a chip including: a processor, configured to call and run a computer program stored in the memory from a memory, and execute any one of the possible implementation manners of the second aspect to the fifth aspect. Any kind of method.
  • any of the access network devices, terminal devices, computer storage media, chips, or computer program products provided above can be applied to the corresponding methods provided above, and therefore, the benefits that can be achieved are For the effect, please refer to the beneficial effect in the corresponding method, which will not be repeated here.
  • Fig. 1 is a schematic diagram of a communication system to which the technical solution provided in this application is applicable;
  • FIG. 2 is a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
  • FIG. 3 is a schematic flowchart of a method for accessing network slicing according to an embodiment of this application;
  • FIG. 4 is a schematic diagram of a network structure applicable to an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another method for accessing network slicing according to an embodiment of this application.
  • FIG. 6 is a schematic structural diagram of a terminal device provided by an embodiment of this application.
  • FIG. 7 is a schematic structural diagram of an access network device provided by an embodiment of this application.
  • FIG. 8 is a schematic structural diagram of another access network device provided by an embodiment of this application.
  • the network architecture and service scenarios described in the embodiments of the present application are intended to more clearly illustrate the technical solutions of the embodiments of the present application, and do not constitute a limitation to the technical solutions provided in the embodiments of the present application.
  • a person of ordinary skill in the art knows that with the evolution of network architecture and the emergence of new business scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
  • the technical solutions provided in this application can be applied to various communication systems.
  • the technical solutions provided in this application can be applied to 5G communication systems, future evolution systems, or multiple communication convergence systems, etc., and can also be applied to existing communication systems, etc.
  • the application scenarios of the technical solutions provided by this application can include multiple, such as machine to machine (M2M), macro and micro communications, enhanced mobile broadband (eMBB), ultra-high reliability and ultra-low Scenarios such as ultra-reliable & low latency communication (uRLLC) and massive machine type communication (mMTC).
  • M2M machine to machine
  • eMBB enhanced mobile broadband
  • uRLLC ultra-reliable & low latency communication
  • mMTC massive machine type communication
  • These scenarios may include, but are not limited to: a communication scenario between a terminal device and a terminal device, a communication scenario between a network device and a network device, a communication scenario between a network device and a terminal device, and so on.
  • the following descriptions are all based on scenarios that are applied to communication between network devices and terminal devices as examples.
  • Fig. 1 shows a schematic diagram of a communication system to which the technical solution provided by the present application is applicable.
  • the communication system may include one or more network devices 100 (only one is shown) and a communication system connected to each network device 100.
  • FIG. 1 is only a schematic diagram, and does not constitute a limitation on the applicable scenarios of the technical solutions provided in this application.
  • the network device 100 may be a transmission reception point (TRP), a base station, a relay station, or an access point.
  • the network device 100 may be a network device in a 5G communication system or a network device in a future evolution network; it may also be a wearable device or a vehicle-mounted device. It can also be the base transceiver station (BTS) in the global system for mobile communication (GSM) or code division multiple access (CDMA) network, or broadband
  • the NB (NodeB) in wideband code division multiple access (WCDMA) may also be the eNB or eNodeB (evolutional NodeB) in long term evolution (LTE).
  • the network device 10 may also be a wireless controller in a cloud radio access network (cloud radio access network, CRAN) scenario.
  • cloud radio access network cloud radio access network, CRAN
  • the terminal equipment 200 may be user equipment (UE), access terminal equipment, UE unit, UE station, mobile station, mobile station, remote station, remote terminal equipment, mobile equipment, UE terminal equipment, wireless communication equipment, UE Agent or UE device, etc.
  • the access terminal equipment can be a cellular phone, a cordless phone, a session initiation protocol (SIP) phone, a wireless local loop (WLL) station, a personal digital assistant (PDA), and a wireless Communication function handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks, or future evolution of public land mobile network (PLMN) networks Terminal equipment, etc.
  • SIP session initiation protocol
  • WLL wireless local loop
  • PDA personal digital assistant
  • PLMN public land mobile network
  • each network element in FIG. 1 can be implemented by one device, or can be implemented by multiple devices, or can be a functional module in one device.
  • the embodiment does not specifically limit this. It is understandable that the above functions may be network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • each network element in FIG. 1 may be implemented by the communication device 200 in FIG. 2.
  • Fig. 2 shows a schematic diagram of the hardware structure of a communication device provided by an embodiment of the application.
  • the communication device 200 includes at least one processor 201, a communication line 202, a memory 203, and at least one communication interface 204.
  • the processor 201 can be a general-purpose central processing unit (central processing unit, CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more programs for controlling the execution of the program of this application. integrated circuit.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • the communication line 202 may include a path to transmit information between the aforementioned components.
  • the communication interface 204 uses any device such as a transceiver to communicate with other devices or communication networks, such as Ethernet, RAN, and wireless local area networks (WLAN).
  • a transceiver to communicate with other devices or communication networks, such as Ethernet, RAN, and wireless local area networks (WLAN).
  • WLAN wireless local area networks
  • the memory 203 may be a read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types that can store information and instructions
  • the dynamic storage device can also be electrically erasable programmable read-only memory (EEPROM), compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (Including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program codes in the form of instructions or data structures and can be used by a computer Any other media accessed, but not limited to this.
  • the memory can exist independently and is connected to the processor through the communication line 202.
  • the memory can also be integrated with the processor.
  • the memory provided in the embodiments of the present application may generally be non-volatile.
  • the memory 203 is used to store computer-executable instructions for executing the solution of the present application, and the processor 201 controls the execution.
  • the processor 201 is configured to execute computer-executable instructions stored in the memory 203, so as to implement the method provided in the following embodiments of the present application.
  • the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
  • the processor 201 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 2.
  • the communication device 200 may include multiple processors, such as the processor 201 and the processor 207 in FIG. 2. Each of these processors can be a single-CPU (single-CPU) processor or a multi-core (multi-CPU) processor.
  • the processor here may refer to one or more devices, circuits, and/or processing cores for processing data (for example, computer program instructions).
  • the communication device 200 may further include an output device 205 and an input device 206.
  • the output device 205 communicates with the processor 201 and can display information in a variety of ways.
  • the output device 205 may be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector (projector) Wait.
  • the input device 206 communicates with the processor 201, and can receive user input in a variety of ways.
  • the input device 206 may be a mouse, a keyboard, a touch screen device, a sensor device, or the like.
  • the aforementioned communication device 200 may be a general-purpose device or a special-purpose device.
  • the communication device 200 may be a desktop computer, a portable computer, a network server, a PDA (personal digital assistant, PDA), a mobile phone, a tablet computer, a wireless terminal device, an embedded device, or a device with a similar structure in FIG. 2 equipment.
  • PDA personal digital assistant
  • the embodiment of the present application does not limit the type of the communication device 200.
  • Network slicing in the fifth-generation mobile communication technology (5th-Generation, 5G) network, different tenants can be provided with different services, and the quality of service (QoS) of different services is different, so a physical network can be divided
  • QoS quality of service
  • a physical network can be divided
  • the network access information of network slices of different services is different.
  • One access network device manages multiple cells, and each cell supports one or more network slices. Each network slice supports the business of different services.
  • Services refer to services such as voice, fax, video, and data that terminal equipment needs to transmit on the network.
  • words such as “exemplary” or “for example” are used as examples, illustrations, or illustrations. Any embodiment or design solution described as “exemplary” or “for example” in the embodiments of the present application should not be construed as being more preferable or advantageous than other embodiments or design solutions. To be precise, words such as “exemplary” or “for example” are used to present related concepts in a specific manner.
  • At least one refers to one or more.
  • Multiple means two or more.
  • "and/or” is merely an association relationship describing associated objects, indicating that there can be three types of relationships, for example, A and/or B, which can mean that A exists alone, and A and A exist at the same time. B, there are three cases of B alone.
  • the character "/" in this text generally indicates that the associated objects before and after are in an "or" relationship.
  • FIG. 3 it is a schematic flowchart of a method for accessing network slicing according to an embodiment of this application. Exemplarily, this embodiment may be applied to the communication system shown in FIG. 1.
  • the method shown in FIG. 3 may include the following steps:
  • the terminal device sends the identification information of the target network slice to the first access network device.
  • the first access network device is the access network device accessed by the terminal device.
  • the first access network device is an access network device that manages the current cell, and the current cell is the cell accessed by the terminal device. The current cell does not support the target network slice.
  • the target network slice is a network slice that the terminal device requests to access, and the target network slice is a logical network that can provide a specific service for the terminal device.
  • the terminal device may send the identification information of the target network slice during the establishment of a radio resource control (RRC) connection with the first access network device, or may establish an RRC connection with the first access network device. After the connection, the identification information of the target network slice is sent.
  • RRC radio resource control
  • the terminal device when the terminal device sends an RRC connection establishment complete message to the first access network device, the RRC connection establishment complete message includes identification information of the target network slice.
  • the first access network device obtains the identification information of the target cell according to the identification information of the target network slice.
  • the target cell is a cell that supports the target network slice.
  • the first access network device may obtain the target network slice according to the pre-stored correspondence between "identification information of multiple cells and identification information of network slices supported by each of the multiple cells".
  • the identification information of the cell corresponds to the identification information.
  • the identification information of the cell in the corresponding relationship includes: identification information of the cell managed by the first access network device and identification information of the cell managed by the access network device adjacent to the first access network device.
  • the first access network device may exchange the identifiers of network slices supported by the cells managed by each other with the access network devices adjacent to the first access network device through a public interface (such as an Xn interface) when it is powered on. Information and store.
  • the access network device that manages the cell sends a notification to other access network devices that have a public interface with the access network device through the public interface for other access network devices.
  • the access network device updates and saves the correspondence between "identification information of multiple cells and identification information of network slices supported by each of the multiple cells".
  • the first access network device determines the second access network device according to the identification information of the target cell.
  • the second access network device is an access network device that manages the target cell.
  • the first access network device obtains the access network device corresponding to the identification information of the target cell according to the correspondence between the identification information of the multiple access network devices and the identification information of the cell managed by each access network device. And use the acquired identification information of the access network device as the identification information of the second access network device.
  • the maintenance of the correspondence between the identification information of the cell and the identification information of the access network device can refer to the prior art.
  • the access network equipment can start the establishment process of the network interface (such as Xn interface) between the access network equipment in the 5G access network (next generation-ran, NG-RAN) after being powered Neighboring other access network equipment establishes an interface.
  • the first access network device exchanges the identification information of each cell in the one or more cells managed by the first access network device and the identification information of the network slice supported by each cell with the adjacent access network device.
  • each access network device saves the identification information of the adjacent access network device that has an Xn interface with the access network device and the identification information of the cell managed by each access network device. Correspondence.
  • the first access network device determines that the second access network device and the first access network device are not the same access network device.
  • the first access network device may perform S105 to S107 to obtain the identification information of the terminal device.
  • the first access network device may obtain the identification information of the terminal device according to the identification information of the target network slice. Specifically, refer to the implementation in S106, which will not be repeated here.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell, such as a cell-radio network temporary identifier (C-RNTI).
  • C-RNTI cell-radio network temporary identifier
  • the first access network device sends the identification information of the target network slice to the second access network device.
  • the second access network device determines, according to the identification information of the target network slice, that the terminal device is allowed to access the target network slice.
  • the second access network device performs admission control according to the identification information of the target network slice to determine the load condition of the cell supporting the target network slice to allow the terminal device to access the target network slice.
  • the second access network device allocates the identification information of the terminal device to the terminal device.
  • the second access network device sends the identification information of the terminal device to the first access network device.
  • the first access network device sends the identification information of the terminal device to the terminal device.
  • the first access network device sends an RRC connection establishment complete message to the second access network device.
  • the RRC connection establishment complete message comes from the terminal device.
  • the second access network device and the first access network device are the same access network device, S110 may not be performed.
  • the embodiment of the present application does not limit the execution sequence of S109 and S110.
  • the first access network device may execute S109 after executing S110.
  • S111 The terminal device accesses the target network slice according to the identification information of the terminal device.
  • the terminal device transfers from the current cell to the target cell according to the identification information of the terminal device to access the target network slice.
  • the terminal equipment transfer to the target cell refers to the terminal equipment handover from the current cell to the target cell without data bearer.
  • the terminal device can monitor the network access information sent by the second access network device in the target cell to access the target network slice.
  • the network access information may include: necessary information for the terminal device to access the target network slice, such as at least one of transmission time-interval (TTI), frequency point, or downlink bandwidth information related to the target network slice.
  • TTI transmission time-interval
  • the network access information may also include uplink-downlink ratio information related to the target network slice, timer information, a dedicated preamble allocated by the second access network device for the terminal device, and bearer configuration information (such as information At least one of information such as resource radio bearer (sigaling radio bearer, SRB) configuration information) or counter information.
  • SRB resource radio bearer
  • the first access network device does not obtain the identification information of the terminal device in the first embodiment, a message is sent to the terminal device, and the message includes the information that can be obtained by the first access network device. Information about the cell that supports the target network slicing.
  • the terminal device stores the message, and reports it to the first access network device through a minimization drive test (MDT) message, and the message is used for the first access network device to optimize the network.
  • MDT minimization drive test
  • the first access network device may send the message to the device where the operation administration and maintenance (OAM) is located, for the device to determine in which cells to enable and support the target network slice.
  • OAM operation administration and maintenance
  • the terminal device actively reports the identification information of the target network slice to the first access network device, so that the first access network device allocates the identification information of the terminal device to the terminal device, and the identification information of the terminal device is used for
  • the first access network device selects the target cell.
  • the terminal device can access the target network slice.
  • it reduces the occupation of air interface broadcast resources by the network slice list information.
  • the terminal device does not need to send a request to the first access network device to obtain the list information of network slices supported by the accessed cell, and determine the cell where the terminal device is located. Whether to support target network slicing. In this way, the efficiency of the terminal device accessing the target network slice is improved, and the energy consumption of the terminal device is reduced.
  • 5G introduces the inactive (INACTIVE) state.
  • the access network device When the terminal device has no data to transmit for a period of time, the access network device notifies the terminal device to enter the INACTIVE state.
  • the user plane protocol stack is stored in the target cell, and the channel (such as N3 tunnel) used to transmit the service of the terminal device between the access network device and the core network device is also reserved.
  • the access network device sends a cell list to the terminal device, and if the terminal device moves within the range of the cell list, there is no need to notify the access network device.
  • FIG. 4 it is a schematic diagram of a network structure applicable to the embodiment of the present application.
  • a user plane function (UPF) 30 is connected to the target cell through a channel.
  • the cell list sent by the access network device to the terminal device includes cell A, target cell, and cell B.
  • the cell A, the target cell, and the cell B together form a RAN-based notification area (RNA).
  • RNA RAN-based notification area
  • this application proposes a method for accessing network slicing.
  • the second embodiment specifically describes the method for accessing network slicing.
  • FIG. 5 it is a schematic flowchart of another method for accessing network slicing provided by an embodiment of this application. Exemplarily, this embodiment may be applied to the communication system shown in FIG. 1.
  • the method shown in Figure 5 may include the following steps:
  • the terminal device sends the identification information of the terminal device in the target cell and the identification information of the target cell to the first access network device.
  • the target cell is a cell that supports the target network slice.
  • the first access network device is the access network device accessed by the terminal device.
  • the target network slice is a network slice that the terminal device requests to access, and the target network slice is a logical network that can provide a specific service for the terminal device.
  • the first access network device is an access network device that manages the current cell, and the current cell is the cell accessed by the terminal device. The current cell does not support the target network slice.
  • the terminal device after establishing an RRC connection with the first access network device, the terminal device sends the identification information of the terminal device in the target cell and the identification information of the target cell to the first access network device.
  • the embodiment of the present application does not limit how the terminal device sends the identification information of the terminal device in the target cell and the identification information of the target cell to the first access network device.
  • the identification information of the terminal equipment in the target cell and the identification information of the target cell may be carried in RRC signaling.
  • the terminal device sends an RRC connection resume (RRC connection resume) message to the first access network device, and the terminal device’s identification information in the target cell and the target cell’s identification information are carried in the RRC connection resume message (e.g., carried in the resume id). in).
  • the identification information of the terminal device in the target cell and the identification information of the target cell may be carried in one or two new messages designed in the embodiment of the present application.
  • the first access network device determines the second access network device according to the identification information of the target cell.
  • the first access network device obtains the access network device corresponding to the identification information of the target cell according to the correspondence between the identification information of the multiple access network devices and the identification information of the cell managed by each access network device. And use the acquired identification information of the access network device as the identification information of the second access network device. Thus, the second access network device is determined.
  • the first access network device determines that the second access network device and the first access network device are not the same access network device, and allocates the first interface to the terminal device according to the identification information of the terminal device in the target cell .
  • the first interface is used to receive the service sent by the second access network device to the terminal device.
  • the first interface may be a port in the first access network device.
  • the first interface is also used to send a service from the terminal device to the second access network device.
  • the first access network device sends the identification information of the first interface and the identification information of the terminal device in the target cell to the second access network device.
  • the first access network device may include the first The identification information of the interface and the identification information of the terminal device in the target cell.
  • the identification information of the first interface and the identification information of the terminal device in the target cell may also be sent separately through multiple messages.
  • the second access network device stores the identification information of the first interface, and allocates the second interface to the terminal device according to the identification information of the terminal device in the target cell.
  • the second interface is used to receive the service from the terminal device sent by the first access network device.
  • the second interface may be a port in the second access network device.
  • the second interface is also used to send the service of the terminal device to the first access network device.
  • the second access network device when the second access network device needs to send a service to the terminal device, it first sends the service to the first interface of the first access network device, and then the first access network sends the service to the terminal device.
  • S206 The second access network device sends the identification information of the second interface to the first access network device.
  • the first access network device stores the identification information of the second interface.
  • the service is sent to the second interface of the second access network device.
  • the terminal device can access the target network slice through the first access network device, the channel, and the second access network device. Specifically, the terminal device sends a service to the UPF network element through the first access network device, the channel, and the second access network device in the current cell. The second access network device sends the service from the UPF network element and sent to the terminal device to the first access network device through the channel, and the first access network device sends the service to the terminal device.
  • the first access network device establishes a channel for the terminal device together with the second access network device according to the received identification information of the terminal device in the target cell from the terminal device, thereby enabling the terminal device to pass through
  • the first access network device, the channel, and the second access network device access the target network slice.
  • the terminal device does not need to re-establish the RRC connection with the second access network device.
  • the efficiency of terminal equipment accessing the target network slice is improved, and the energy consumption of the terminal equipment is reduced.
  • the terminal device finally transfers from the current cell to the target cell to access the target network slice.
  • the terminal device does not need to be transferred to the target cell, but is still in the current cell, and the first access network device managing the current cell sends the service of the terminal device to the core network through the channel and the second access network device.
  • the first embodiment described above can be used in a scenario where a terminal device initially accesses a target network slice, and is aimed at a terminal device in an idle state. The terminal device in this state has not accessed the target network slice.
  • the second embodiment can be used in a scenario where a terminal device in an inactive (INACTIVE) state restores the connection with the access network device.
  • the terminal device in the inactive state has accessed the target network slice, and the terminal device stores the identification information of the target cell and the identification information of the terminal device in the target cell.
  • the embodiment of the present application may divide the computer equipment into functional modules according to the foregoing method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • the terminal device 50 can be used to perform the functions performed by the terminal device in any of the above embodiments (the embodiment shown in FIG. 3 or FIG. 5).
  • the terminal device 50 may include: a sending module 501, a processing module 502, and a receiving module 503.
  • the sending module 501 is configured to send the identification information of the target network slice to the access network device, and the access network device is the access network device that the terminal device 50 accesses.
  • the identification information of the target network slice is used by the access network device to obtain the identification information of the target cell, so as to obtain the identification information of the terminal device 50.
  • the target cell is a cell that supports the target network slice.
  • the identification information of the terminal device 50 is the identification information of the terminal device 50 in the target cell.
  • the receiving module 503 is configured to receive the identification information of the terminal device 50 sent by the access network device.
  • the processing module 502 is configured to access the target network slice according to the identification information of the terminal device 50.
  • the sending module 501 can be used to execute the sending step in S101; the receiving module 503 can be used to execute the receiving step in S109; and the processing module 502 can be used to execute S111.
  • the sending module 501 may be used to execute the sending step in S201.
  • the identification information of the target network slice is carried in a radio resource control RRC connection establishment complete message.
  • the aforementioned sending module 501 and receiving module 503 can be implemented by the communication interface 204 in Figure 2; the processing module 502 can be implemented by the processor 201 in Figure 2 calling a computer program stored in the memory 203 .
  • the access network device 60 can be used to perform the first access in any of the above embodiments (the embodiment shown in FIG. 3).
  • the access network device 60 includes: a receiving module 601, a processing module 602, and a sending module 603.
  • the receiving module 601 is configured to receive the identification information of the target network slice sent by the terminal device that accesses the access network device 60.
  • the processing module 602 is configured to obtain the identification information of the target cell according to the identification information of the target network slice.
  • the target cell is a cell that supports the target network slice. According to the identification information of the target cell, the identification information of the terminal device is determined.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the sending module 603 is configured to send the identification information of the terminal device to the terminal device.
  • the identification information of the terminal device is used for the terminal device to access the target network slice.
  • the receiving module 601 may be used to perform the receiving steps in S101 and S108.
  • the processing module 602 may be used to execute S102 to S104.
  • the sending module 603 can be used to execute the sending steps in S105 and S109 to S110.
  • the processing module 602 is specifically configured to: determine the second access network device according to the identification information of the target cell.
  • the second access network device is an access network device that manages the target cell.
  • the sending module 603 is further configured to send the identification information of the target network slice to the second access network device.
  • the identification information of the target network slice is used by the second access network device to determine that the terminal device is allowed to access the target network slice, and to allocate the identification information of the terminal device to the terminal device.
  • the receiving module 601 is further configured to receive the identification information of the terminal device sent by the second access network device.
  • the above-mentioned receiving module 601 and sending module 603 may be implemented by the communication interface 204 in FIG. 2; the processing module 602 may be implemented by the processor 201 in FIG. 2 calling a computer program stored in the memory 203 .
  • the access network device 60 can be used to perform the second access in any of the above embodiments (the embodiment shown in FIG. 3).
  • the access network device 60 is an access network device that manages the target cell.
  • the target cell is a cell that supports the target network slice.
  • the access network device 60 includes: a receiving module 601, a processing module 602, and a sending module 603.
  • the receiving module 601 is configured to receive the identification information of the target network slice sent by the first access network device.
  • the first access network device is the access network device accessed by the terminal device.
  • the target network slice is the network slice that the terminal device requests to access.
  • the processing module 602 is configured to determine, according to the identification information of the target network slice, that the terminal device is allowed to access the target network slice. Assign terminal device identification information to the terminal device.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the sending module 603 is configured to send the identification information of the terminal device to the first access network device, and the identification information of the terminal device is used to access the target network slice.
  • the receiving module 601 may be used to perform the receiving steps in S105 and S110.
  • the processing module 602 can be used to execute S106 to S107.
  • the sending module 603 can be used to execute the sending step in S108.
  • the above-mentioned receiving module 601 and sending module 603 may be implemented by the communication interface 204 in FIG. 2; the processing module 602 may be implemented by the processor 201 in FIG. 2 calling a computer program stored in the memory 203 .
  • the access network device 70 can be used to execute the first access in any of the above embodiments (the embodiment shown in FIG. 5). The function performed by the connected device.
  • the access network device 70 includes: a receiving module 701 and a processing module 702.
  • the receiving module 701 is configured to receive the identification information of the terminal device and the identification information of the target cell sent by the terminal device accessing the access network device 70.
  • the target cell is a cell that supports the target network slice.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the processing module 702 is configured to determine a second access network device according to the identification information of the target cell, where the second access network device is an access network device that manages the target cell. According to the identification information of the terminal device, a channel is established between the access network device 70 and the second access network device, and the channel is used for the terminal device to access the target network slice through the access network device 70 and the second access network device. .
  • the processing module 702 is specifically configured to allocate the first interface to the terminal device according to the identification information of the terminal device.
  • the first interface is used to receive the service sent by the second access network device to the terminal device.
  • the access network device 70 further includes: a sending module 703, configured to send the identification information of the first interface and the identification information of the terminal device to the second access network device, so that the second access network device stores the identification information of the first interface , And allocate the second interface to the terminal device according to the identification information of the terminal device.
  • the second interface is used to receive the service from the terminal device sent by the access network device 70.
  • the receiving module 701 is further configured to receive the identification information of the second interface sent by the second access network device.
  • the access network device 70 further includes: a storage module 704, configured to store identification information of the second interface.
  • the receiving module 701 may be used to perform the receiving steps in S201 and S206.
  • the processing module 702 can be used to execute S202 to S203.
  • the sending module 703 can be used to execute the sending step in S204.
  • the storage module 704 may be used to execute S207.
  • the receiving module 701 is further configured to receive the service sent by the second access network device to the terminal device through the channel.
  • the sending module 703 is also used to send services to the terminal device.
  • the above-mentioned receiving module 701 and sending module 703 may be implemented by the communication interface 204 in FIG. 2; the processing module 702 may be implemented by the processor 201 in FIG. 2 calling a computer program stored in the memory 203 .
  • the access network device 70 can be used to perform the second access in any of the above embodiments (the embodiment shown in FIG. 5).
  • the access network device 70 is an access network device that manages the target cell.
  • the target cell is a cell that supports the target network slice.
  • the access network device 70 includes a receiving module 701, configured to receive identification information of the first interface and identification information of the terminal device sent by the first access network device.
  • the first access network device is the access network device accessed by the terminal device.
  • the first interface is used to receive the service sent by the access network device 70 to the terminal device.
  • the first interface is an interface allocated by the first access network device to the terminal device.
  • the identification information of the terminal device is the identification information of the terminal device in the target cell.
  • the storage module 704 is configured to store the identification information of the first interface.
  • the processing module 702 is configured to allocate a second interface to the terminal device according to the identification information of the terminal device.
  • the second interface is used to receive the service from the terminal device sent by the first access network device.
  • the sending module 703 is configured to send the identification information of the second interface to the first access network device, so that the first access network device stores the identification information of the second interface.
  • the first interface and the second interface are used for the terminal device to access the target network slice through the first access network device and the access network device 70.
  • the receiving module 701 may be used to execute the receiving step in S204.
  • the processing module 702 is used to execute S205.
  • the sending module 703 may be used to execute the sending step in S206.
  • the storage module 704 may be used to perform the operation of storing the identification information of the first interface in S205.
  • the sending module 703 is further configured to send the service of the terminal device to the first interface of the first access network device; and is configured to send the service of the terminal device to the terminal device by the first access network device.
  • the above-mentioned receiving module 701 and sending module 703 may be implemented by the communication interface 204 in FIG. 2; the processing module 702 may be implemented by the processor 201 in FIG. 2 calling a computer program stored in the memory 203 .
  • the embodiment of the present application also provides a device (such as a computer device or a chip), including: a memory and a processor; the memory is used to store a computer program, and the processor is used to call the computer program to execute any of the above-provided computer programs. Actions or steps mentioned in the embodiment.
  • the embodiments of the present application also provide a computer-readable storage medium with a computer program stored on the computer-readable storage medium.
  • the computer program runs on a computer, the computer executes any of the above-provided embodiments. The action or step mentioned.
  • the embodiment of the application also provides a chip.
  • the chip integrates a circuit and one or more interfaces for realizing the functions of the above-mentioned network device.
  • the functions supported by the chip may include processing actions based on the embodiments described in FIG. 3 and FIG. 5, which will not be repeated here.
  • a person of ordinary skill in the art can understand that all or part of the steps for implementing the above-mentioned embodiments can be completed by a program instructing related hardware.
  • the program can be stored in a computer-readable storage medium.
  • the aforementioned storage medium may be a read-only memory, a random access memory, and the like.
  • the aforementioned processing unit or processor may be a central processing unit, a general-purpose processor, an application specific integrated circuit (ASIC), a microprocessor (digital signal processor, DSP), and a field programmable gate array (field programmable gate array).
  • ASIC application specific integrated circuit
  • DSP digital signal processor
  • field programmable gate array field programmable gate array
  • FPGA field programmable gate array
  • the embodiments of the present application also provide a computer program product containing instructions, which when the instructions run on a computer, cause the computer to execute any one of the methods in the foregoing embodiments.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part.
  • the computer can be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. Computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • computer instructions may be transmitted from a website, computer, server, or data center through a cable (such as Coaxial cable, optical fiber, digital subscriber line (digital subscriber line, DSL) or wireless (such as infrared, wireless, microwave, etc.) transmission to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or may include one or more data storage devices such as a server or a data center that can be integrated with the medium.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the foregoing devices for storing computer instructions or computer programs provided in the embodiments of the present application are non-transitory. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande se rapporte au domaine technique des communications. La demande concerne un appareil et un procédé d'accès à une tranche de réseau, qui facilitent la préservation des ressources de réseau, l'amélioration de l'efficacité d'accès par des dispositifs terminaux à des tranches de réseau et la réduction de l'énergie consommée par les dispositifs terminaux. Le procédé est appliqué à un dispositif terminal, et le procédé consiste à : envoyer des informations d'identification d'une tranche de réseau cible à un dispositif d'accès réseau, le dispositif d'accès réseau étant le dispositif d'accès réseau auquel accède le dispositif terminal, les informations d'identification de la tranche de réseau cible étant utilisées pour obtenir des informations d'identification d'une cellule cible par le dispositif d'accès réseau de façon à obtenir les informations d'identification du dispositif terminal, la cellule cible étant une cellule qui prend en charge la tranche de réseau cible, et les informations d'identification du dispositif terminal étant les informations d'identification du dispositif terminal dans la cellule cible ; recevoir les informations d'identification du dispositif terminal envoyées par le dispositif d'accès réseau ; et accéder à la tranche de réseau cible en fonction des informations d'identification du dispositif terminal.
PCT/CN2019/130218 2019-12-30 2019-12-30 Appareil et procédé d'accès à une tranche de réseau WO2021134377A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/130218 WO2021134377A1 (fr) 2019-12-30 2019-12-30 Appareil et procédé d'accès à une tranche de réseau
CN201980098916.6A CN114175727B (zh) 2019-12-30 2019-12-30 接入网络切片的方法和装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/130218 WO2021134377A1 (fr) 2019-12-30 2019-12-30 Appareil et procédé d'accès à une tranche de réseau

Publications (1)

Publication Number Publication Date
WO2021134377A1 true WO2021134377A1 (fr) 2021-07-08

Family

ID=76687528

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/130218 WO2021134377A1 (fr) 2019-12-30 2019-12-30 Appareil et procédé d'accès à une tranche de réseau

Country Status (2)

Country Link
CN (1) CN114175727B (fr)
WO (1) WO2021134377A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095158A (zh) * 2021-11-04 2022-02-25 中国电信股份有限公司 网络切片选择方法、系统、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281606A (zh) * 2010-06-11 2011-12-14 华为技术有限公司 通信路径切换方法、装置及系统
US20180124661A1 (en) * 2016-11-03 2018-05-03 Industrial Technology Research Institute User equipment, access node and slice-based handover method thereof
CN108924884A (zh) * 2017-04-04 2018-11-30 华为技术有限公司 通信方法及通信设备
CN109041137A (zh) * 2016-01-16 2018-12-18 华为技术有限公司 一种切换的方法、基站及终端设备
CN109151924A (zh) * 2017-06-16 2019-01-04 华为技术有限公司 通信方法及接入网设备、核心网设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696910B (zh) * 2017-04-11 2020-10-09 华为技术有限公司 一种选择目标基站的方法、装置和存储介质
US10757618B2 (en) * 2018-02-07 2020-08-25 Lg Electronics Inc. Method and apparatus for performing handover

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281606A (zh) * 2010-06-11 2011-12-14 华为技术有限公司 通信路径切换方法、装置及系统
CN109041137A (zh) * 2016-01-16 2018-12-18 华为技术有限公司 一种切换的方法、基站及终端设备
US20180124661A1 (en) * 2016-11-03 2018-05-03 Industrial Technology Research Institute User equipment, access node and slice-based handover method thereof
CN108924884A (zh) * 2017-04-04 2018-11-30 华为技术有限公司 通信方法及通信设备
CN109151924A (zh) * 2017-06-16 2019-01-04 华为技术有限公司 通信方法及接入网设备、核心网设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095158A (zh) * 2021-11-04 2022-02-25 中国电信股份有限公司 网络切片选择方法、系统、设备及存储介质

Also Published As

Publication number Publication date
CN114175727A (zh) 2022-03-11
CN114175727B (zh) 2023-04-28

Similar Documents

Publication Publication Date Title
US20220217625A1 (en) Network slice selection method, device, and system
US20220264442A1 (en) Session establishment method, relay device selection method, registration method, and device
WO2015139592A1 (fr) Procédé d'affectation de ressources et équipement pour la transmission de signaux de dispositif à dispositif
WO2017193825A1 (fr) Procédé et dispositif d'exécution d'une transmission de données
US12035174B2 (en) Rate control method, apparatus, and system
US20210195678A1 (en) Communication Method and Communications Apparatus
US20220264378A1 (en) Communication Method, Device, and System
WO2021239021A1 (fr) Procédé et appareil d'acquisition d'informations de configuration, équipement utilisateur et système
US20230134762A1 (en) Apparatus, Method, and Computer Program
US20230388908A1 (en) Network slice-based communication method and apparatus
US20240056926A1 (en) Communication method and apparatus for obtaining load information
US20140162631A1 (en) Load sharing method, base station, user equipment, load sharing node, and system
WO2021134377A1 (fr) Appareil et procédé d'accès à une tranche de réseau
WO2020088402A1 (fr) Procédé de gestion de canal, point d'accès, et station
EP4460109A1 (fr) Procédé de communication et appareil de communication
WO2019141194A1 (fr) Procédé et dispositif de mise à jour de message système
WO2022237501A1 (fr) Procédé et appareil de positionnement
CN111108785B (zh) 用于无线网络的网络切片特定寻呼周期
WO2022082772A1 (fr) Procédé de transmission de données et appareil associé
WO2022077286A1 (fr) Station de base, équipement d'utilisateur et procédé de transmission de petites données sur la base d'un accès aléatoire
WO2022099539A1 (fr) Procédé et appareil de communication
WO2024093986A1 (fr) Procédé et appareil de communication
US20240373494A1 (en) Communication method and system
US9332459B1 (en) Method and system for setting a hold-timer duration
US20230345255A1 (en) Spectrum resource sharing method, device, and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19958104

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19958104

Country of ref document: EP

Kind code of ref document: A1